Resubmissions

15-10-2024 15:36

241015-s1zlzasdkc 10

01-07-2024 18:32

240701-w6yteawhmq 10

01-07-2024 14:52

240701-r82wmaxdnd 10

01-07-2024 14:52

240701-r8syqa1dpp 10

11-03-2024 21:22

240311-z8dsssgg58 10

01-09-2021 13:18

210901-5bmxjspa5s 10

01-09-2021 13:04

210901-te4btfspqa 10

01-09-2021 05:12

210901-4wnkwm1p3j 10

31-08-2021 21:47

210831-41rp97dma2 10

31-08-2021 19:51

210831-359awwatje 10

Analysis

  • max time kernel
    102s
  • max time network
    1806s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    21-08-2021 07:49

General

  • Target

    Setup (15).exe

  • Size

    631KB

  • MD5

    cb927513ff8ebff4dd52a47f7e42f934

  • SHA1

    0de47c02a8adc4940a6c18621b4e4a619641d029

  • SHA256

    fd5c970806fba1500cbb6af5328329aeb43b8de3f02d90ec5d8cd1d57711622f

  • SHA512

    988c8fd886a9155b7d190faf2ce6b34d910efcffcf1c6251f18a9d0c804a0ea26a89679273033ac98b200363c536426efd1ae9de445c34e660369abb06f0071c

Malware Config

Extracted

Family

redline

Botnet

www

C2

185.204.109.146:54891

Extracted

Family

redline

Botnet

Second_7.5K

C2

45.14.49.200:27625

Extracted

Family

vidar

Version

40.1

Botnet

937

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    937

Extracted

Family

redline

C2

205.185.119.191:18846

Extracted

Family

redline

Botnet

20_8_rs

C2

jekorikani.xyz:80

Extracted

Family

redline

Botnet

dibild

C2

135.148.139.222:33569

Extracted

Family

redline

Botnet

19.08

C2

95.181.172.100:6795

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 34 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 44 IoCs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 56 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Themida packer 22 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 20 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 12 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 4 IoCs
  • Kills process with taskkill 6 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Script User-Agent 8 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup (15).exe
    "C:\Users\Admin\AppData\Local\Temp\Setup (15).exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\Documents\zzBlROWSumAUtKJFkVYWdx9t.exe
      "C:\Users\Admin\Documents\zzBlROWSumAUtKJFkVYWdx9t.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1384
    • C:\Users\Admin\Documents\e_wZiDZBvI5cI3n5ujHES0Vr.exe
      "C:\Users\Admin\Documents\e_wZiDZBvI5cI3n5ujHES0Vr.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:956
      • C:\Users\Admin\AppData\Roaming\5758290.exe
        "C:\Users\Admin\AppData\Roaming\5758290.exe"
        3⤵
        • Executes dropped EXE
        PID:2392
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2392 -s 1740
          4⤵
          • Program crash
          PID:2532
      • C:\Users\Admin\AppData\Roaming\6044921.exe
        "C:\Users\Admin\AppData\Roaming\6044921.exe"
        3⤵
          PID:2688
          • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
            "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
            4⤵
              PID:2236
        • C:\Users\Admin\Documents\Vz5wtW0pBiAoPTjea0cy4FDR.exe
          "C:\Users\Admin\Documents\Vz5wtW0pBiAoPTjea0cy4FDR.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1708
        • C:\Users\Admin\Documents\hh6V5GehBR0eZnYutJsnNTYk.exe
          "C:\Users\Admin\Documents\hh6V5GehBR0eZnYutJsnNTYk.exe"
          2⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          PID:1868
        • C:\Users\Admin\Documents\aUGmA5GhTyRz_LmYeXskwDvq.exe
          "C:\Users\Admin\Documents\aUGmA5GhTyRz_LmYeXskwDvq.exe"
          2⤵
          • Executes dropped EXE
          PID:1336
        • C:\Users\Admin\Documents\Bia420ugUKri_wnCTfXHntNi.exe
          "C:\Users\Admin\Documents\Bia420ugUKri_wnCTfXHntNi.exe"
          2⤵
          • Executes dropped EXE
          PID:1264
          • C:\Users\Admin\Documents\Bia420ugUKri_wnCTfXHntNi.exe
            C:\Users\Admin\Documents\Bia420ugUKri_wnCTfXHntNi.exe
            3⤵
              PID:3056
          • C:\Users\Admin\Documents\jN3XFLlLGgPGNK0obRdDDXkr.exe
            "C:\Users\Admin\Documents\jN3XFLlLGgPGNK0obRdDDXkr.exe"
            2⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            PID:1036
          • C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
            "C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe"
            2⤵
            • Executes dropped EXE
            PID:1656
            • C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
              C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
              3⤵
                PID:3036
              • C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
                C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
                3⤵
                  PID:2168
              • C:\Users\Admin\Documents\qwOSNLCcAkt3lGTqdoRjNIUZ.exe
                "C:\Users\Admin\Documents\qwOSNLCcAkt3lGTqdoRjNIUZ.exe"
                2⤵
                • Executes dropped EXE
                PID:544
                • C:\Users\Admin\Documents\qwOSNLCcAkt3lGTqdoRjNIUZ.exe
                  "C:\Users\Admin\Documents\qwOSNLCcAkt3lGTqdoRjNIUZ.exe"
                  3⤵
                    PID:4076
                • C:\Users\Admin\Documents\7A_laG0YRHZc9UDiTtzvDv1f.exe
                  "C:\Users\Admin\Documents\7A_laG0YRHZc9UDiTtzvDv1f.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:1512
                  • C:\Users\Admin\Documents\7A_laG0YRHZc9UDiTtzvDv1f.exe
                    C:\Users\Admin\Documents\7A_laG0YRHZc9UDiTtzvDv1f.exe
                    3⤵
                      PID:3028
                  • C:\Users\Admin\Documents\FyBOjPNRsEmu9hyyka17XgpS.exe
                    "C:\Users\Admin\Documents\FyBOjPNRsEmu9hyyka17XgpS.exe"
                    2⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1812
                  • C:\Users\Admin\Documents\7QDDf6tiHk6uopv5DEZYIjap.exe
                    "C:\Users\Admin\Documents\7QDDf6tiHk6uopv5DEZYIjap.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:1220
                  • C:\Users\Admin\Documents\llQj5weywNSNnTe2YDxVN6RI.exe
                    "C:\Users\Admin\Documents\llQj5weywNSNnTe2YDxVN6RI.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:1104
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 888
                      3⤵
                      • Program crash
                      PID:3656
                  • C:\Users\Admin\Documents\ITCvR79WOX9SjcIxlSzUHSef.exe
                    "C:\Users\Admin\Documents\ITCvR79WOX9SjcIxlSzUHSef.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:2044
                  • C:\Users\Admin\Documents\c5j5c0QGDgQVNhuu0qMQ74q1.exe
                    "C:\Users\Admin\Documents\c5j5c0QGDgQVNhuu0qMQ74q1.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:240
                    • C:\Users\Admin\Documents\c5j5c0QGDgQVNhuu0qMQ74q1.exe
                      "C:\Users\Admin\Documents\c5j5c0QGDgQVNhuu0qMQ74q1.exe" -q
                      3⤵
                      • Executes dropped EXE
                      PID:2292
                  • C:\Users\Admin\Documents\SG2hNfyIOWdflyWJKD1EdWpw.exe
                    "C:\Users\Admin\Documents\SG2hNfyIOWdflyWJKD1EdWpw.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:1624
                  • C:\Users\Admin\Documents\0C01piUpZzijT9W_Xv3if3uy.exe
                    "C:\Users\Admin\Documents\0C01piUpZzijT9W_Xv3if3uy.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:1600
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c taskkill /im "0C01piUpZzijT9W_Xv3if3uy.exe" /f & erase "C:\Users\Admin\Documents\0C01piUpZzijT9W_Xv3if3uy.exe" & exit
                      3⤵
                        PID:2252
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /im "0C01piUpZzijT9W_Xv3if3uy.exe" /f
                          4⤵
                          • Kills process with taskkill
                          PID:2704
                    • C:\Users\Admin\Documents\twZjRDPUrLRJsrdU_9Mn09_y.exe
                      "C:\Users\Admin\Documents\twZjRDPUrLRJsrdU_9Mn09_y.exe"
                      2⤵
                      • Executes dropped EXE
                      PID:1400
                      • C:\Program Files (x86)\Company\NewProduct\jooyu.exe
                        "C:\Program Files (x86)\Company\NewProduct\jooyu.exe"
                        3⤵
                          PID:2876
                          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                            4⤵
                              PID:2884
                            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                              4⤵
                                PID:3892
                            • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
                              "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
                              3⤵
                                PID:2900
                              • C:\Program Files (x86)\Company\NewProduct\customer3.exe
                                "C:\Program Files (x86)\Company\NewProduct\customer3.exe"
                                3⤵
                                  PID:2920
                              • C:\Users\Admin\Documents\VMAdezTAvyqurGwNogekiAab.exe
                                "C:\Users\Admin\Documents\VMAdezTAvyqurGwNogekiAab.exe"
                                2⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:1632
                                • C:\Users\Admin\AppData\Local\Temp\is-EAJ8H.tmp\VMAdezTAvyqurGwNogekiAab.tmp
                                  "C:\Users\Admin\AppData\Local\Temp\is-EAJ8H.tmp\VMAdezTAvyqurGwNogekiAab.tmp" /SL5="$10176,138429,56832,C:\Users\Admin\Documents\VMAdezTAvyqurGwNogekiAab.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:2464
                                  • C:\Users\Admin\AppData\Local\Temp\is-G4HPS.tmp\Setup.exe
                                    "C:\Users\Admin\AppData\Local\Temp\is-G4HPS.tmp\Setup.exe" /Verysilent
                                    4⤵
                                      PID:1984
                                      • C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe
                                        "C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"
                                        5⤵
                                          PID:1108
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c taskkill /im LGCH2-401_2021-08-18_14-40.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe" & del C:\ProgramData\*.dll & exit
                                            6⤵
                                              PID:1696
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /im LGCH2-401_2021-08-18_14-40.exe /f
                                                7⤵
                                                • Kills process with taskkill
                                                PID:3648
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 6
                                                7⤵
                                                • Delays execution with timeout.exe
                                                PID:3492
                                          • C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe
                                            "C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet
                                            5⤵
                                              PID:2864
                                              • C:\Windows\SysWOW64\msiexec.exe
                                                "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629274510 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"
                                                6⤵
                                                  PID:3744
                                              • C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe
                                                "C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                5⤵
                                                  PID:1016
                                                  • C:\Users\Admin\AppData\Local\Temp\is-020K0.tmp\WEATHER Manager.tmp
                                                    "C:\Users\Admin\AppData\Local\Temp\is-020K0.tmp\WEATHER Manager.tmp" /SL5="$10282,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                    6⤵
                                                      PID:476
                                                  • C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe
                                                    "C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent
                                                    5⤵
                                                      PID:616
                                                      • C:\Users\Admin\AppData\Local\Temp\is-KFRHF.tmp\VPN.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-KFRHF.tmp\VPN.tmp" /SL5="$10288,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent
                                                        6⤵
                                                          PID:656
                                                      • C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe
                                                        "C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                                        5⤵
                                                          PID:556
                                                          • C:\Users\Admin\AppData\Local\Temp\is-UCVRF.tmp\Inlog.tmp
                                                            "C:\Users\Admin\AppData\Local\Temp\is-UCVRF.tmp\Inlog.tmp" /SL5="$1027C,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                                            6⤵
                                                              PID:3008
                                                          • C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe
                                                            "C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"
                                                            5⤵
                                                              PID:2500
                                                            • C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe
                                                              "C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"
                                                              5⤵
                                                                PID:852
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1324
                                                                  6⤵
                                                                  • Program crash
                                                                  PID:3448
                                                              • C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe
                                                                "C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
                                                                5⤵
                                                                  PID:1320
                                                                  • C:\Users\Admin\AppData\Local\Temp\is-RLP3J.tmp\MediaBurner2.tmp
                                                                    "C:\Users\Admin\AppData\Local\Temp\is-RLP3J.tmp\MediaBurner2.tmp" /SL5="$20176,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
                                                                    6⤵
                                                                      PID:1420
                                                                      • C:\Users\Admin\AppData\Local\Temp\is-RQC41.tmp\3377047_logo_media.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\is-RQC41.tmp\3377047_logo_media.exe" /S /UID=burnerch2
                                                                        7⤵
                                                                          PID:3708
                                                                          • C:\Program Files\Windows Mail\IBCFXKOELS\ultramediaburner.exe
                                                                            "C:\Program Files\Windows Mail\IBCFXKOELS\ultramediaburner.exe" /VERYSILENT
                                                                            8⤵
                                                                              PID:3112
                                                                              • C:\Users\Admin\AppData\Local\Temp\is-SSC5K.tmp\ultramediaburner.tmp
                                                                                "C:\Users\Admin\AppData\Local\Temp\is-SSC5K.tmp\ultramediaburner.tmp" /SL5="$103D8,281924,62464,C:\Program Files\Windows Mail\IBCFXKOELS\ultramediaburner.exe" /VERYSILENT
                                                                                9⤵
                                                                                  PID:280
                                                                                  • C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe
                                                                                    "C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu
                                                                                    10⤵
                                                                                      PID:3768
                                                                                • C:\Users\Admin\AppData\Local\Temp\34-08065-dc5-e5d88-bcc0b132433dd\Lelebibaesi.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\34-08065-dc5-e5d88-bcc0b132433dd\Lelebibaesi.exe"
                                                                                  8⤵
                                                                                    PID:2728
                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
                                                                                      9⤵
                                                                                        PID:3992
                                                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3992 CREDAT:275457 /prefetch:2
                                                                                          10⤵
                                                                                            PID:1824
                                                                                            • C:\Users\Admin\AppData\Local\Temp\260167812.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\260167812.exe"
                                                                                              11⤵
                                                                                                PID:2124
                                                                                            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3992 CREDAT:340994 /prefetch:2
                                                                                              10⤵
                                                                                                PID:4896
                                                                                          • C:\Users\Admin\AppData\Local\Temp\e6-306e9-bc8-5cc86-5eeb0eb6f355f\Hishaekujola.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\e6-306e9-bc8-5cc86-5eeb0eb6f355f\Hishaekujola.exe"
                                                                                            8⤵
                                                                                              PID:3352
                                                                                      • C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe
                                                                                        "C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"
                                                                                        5⤵
                                                                                          PID:804
                                                                                          • C:\Users\Admin\AppData\Roaming\4818658.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\4818658.exe"
                                                                                            6⤵
                                                                                              PID:1724
                                                                                            • C:\Users\Admin\AppData\Roaming\5998488.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\5998488.exe"
                                                                                              6⤵
                                                                                                PID:3028
                                                                                              • C:\Users\Admin\AppData\Roaming\8951123.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\8951123.exe"
                                                                                                6⤵
                                                                                                  PID:3040
                                                                                                • C:\Users\Admin\AppData\Roaming\2907842.exe
                                                                                                  "C:\Users\Admin\AppData\Roaming\2907842.exe"
                                                                                                  6⤵
                                                                                                    PID:3268
                                                                                                • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                  "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"
                                                                                                  5⤵
                                                                                                    PID:2300
                                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q
                                                                                                      6⤵
                                                                                                        PID:3676
                                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe
                                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"
                                                                                                      5⤵
                                                                                                        PID:688
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpF3D_tmp.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\tmpF3D_tmp.exe"
                                                                                                          6⤵
                                                                                                            PID:3212
                                                                                                            • C:\Windows\SysWOW64\dllhost.exe
                                                                                                              "C:\Windows\System32\dllhost.exe"
                                                                                                              7⤵
                                                                                                                PID:2956
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks
                                                                                                                7⤵
                                                                                                                  PID:460
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd
                                                                                                                    8⤵
                                                                                                                      PID:2116
                                                                                                                      • C:\Windows\SysWOW64\findstr.exe
                                                                                                                        findstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks
                                                                                                                        9⤵
                                                                                                                          PID:2840
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                                          Esplorarne.exe.com i
                                                                                                                          9⤵
                                                                                                                            PID:3844
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i
                                                                                                                              10⤵
                                                                                                                                PID:4508
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i
                                                                                                                                  11⤵
                                                                                                                                    PID:4272
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i
                                                                                                                                      12⤵
                                                                                                                                        PID:5056
                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                  ping MRBKYMNO -n 30
                                                                                                                                  9⤵
                                                                                                                                  • Runs ping.exe
                                                                                                                                  PID:1776
                                                                                                                        • C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe
                                                                                                                          "C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"
                                                                                                                          5⤵
                                                                                                                            PID:3096
                                                                                                                            • C:\Users\Admin\Documents\HqLjJHDlp16O7fstIWyZ4gME.exe
                                                                                                                              "C:\Users\Admin\Documents\HqLjJHDlp16O7fstIWyZ4gME.exe"
                                                                                                                              6⤵
                                                                                                                                PID:3524
                                                                                                                              • C:\Users\Admin\Documents\KTvSpwR4c2I1J04BSHjsKJtl.exe
                                                                                                                                "C:\Users\Admin\Documents\KTvSpwR4c2I1J04BSHjsKJtl.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:3496
                                                                                                                                • C:\Users\Admin\Documents\949vPo5z7m0veFFMj0tFZt9p.exe
                                                                                                                                  "C:\Users\Admin\Documents\949vPo5z7m0veFFMj0tFZt9p.exe"
                                                                                                                                  6⤵
                                                                                                                                    PID:3592
                                                                                                                                    • C:\Users\Admin\Documents\949vPo5z7m0veFFMj0tFZt9p.exe
                                                                                                                                      C:\Users\Admin\Documents\949vPo5z7m0veFFMj0tFZt9p.exe
                                                                                                                                      7⤵
                                                                                                                                        PID:3312
                                                                                                                                    • C:\Users\Admin\Documents\zMUGxai64ZwEEMSwuZJPZCiG.exe
                                                                                                                                      "C:\Users\Admin\Documents\zMUGxai64ZwEEMSwuZJPZCiG.exe"
                                                                                                                                      6⤵
                                                                                                                                        PID:3564
                                                                                                                                      • C:\Users\Admin\Documents\H_C3eVGXMlIGdKQRG45DJ_pd.exe
                                                                                                                                        "C:\Users\Admin\Documents\H_C3eVGXMlIGdKQRG45DJ_pd.exe"
                                                                                                                                        6⤵
                                                                                                                                          PID:3608
                                                                                                                                        • C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                          "C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe"
                                                                                                                                          6⤵
                                                                                                                                            PID:2780
                                                                                                                                            • C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                              C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                              7⤵
                                                                                                                                                PID:2176
                                                                                                                                              • C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                                C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                                7⤵
                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                • Checks whether UAC is enabled
                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:1336
                                                                                                                                            • C:\Users\Admin\Documents\IbP9pOc3nDt97jyJEyQbZvr6.exe
                                                                                                                                              "C:\Users\Admin\Documents\IbP9pOc3nDt97jyJEyQbZvr6.exe"
                                                                                                                                              6⤵
                                                                                                                                                PID:1836
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-7GTKH.tmp\IbP9pOc3nDt97jyJEyQbZvr6.tmp
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-7GTKH.tmp\IbP9pOc3nDt97jyJEyQbZvr6.tmp" /SL5="$600E8,138429,56832,C:\Users\Admin\Documents\IbP9pOc3nDt97jyJEyQbZvr6.exe"
                                                                                                                                                  7⤵
                                                                                                                                                    PID:2832
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-8BBLQ.tmp\Setup.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-8BBLQ.tmp\Setup.exe" /Verysilent
                                                                                                                                                      8⤵
                                                                                                                                                        PID:616
                                                                                                                                                        • C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe
                                                                                                                                                          "C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"
                                                                                                                                                          9⤵
                                                                                                                                                            PID:3684
                                                                                                                                                    • C:\Users\Admin\Documents\a1FFXrcFGxZF73Hu5zscXD4r.exe
                                                                                                                                                      "C:\Users\Admin\Documents\a1FFXrcFGxZF73Hu5zscXD4r.exe"
                                                                                                                                                      6⤵
                                                                                                                                                        PID:3548
                                                                                                                                                      • C:\Users\Admin\Documents\GE2dmPT8XfEH_UMw1T00auvA.exe
                                                                                                                                                        "C:\Users\Admin\Documents\GE2dmPT8XfEH_UMw1T00auvA.exe"
                                                                                                                                                        6⤵
                                                                                                                                                          PID:3484
                                                                                                                                                        • C:\Users\Admin\Documents\foRa0fxHPD9EhdaaIlFtNFFz.exe
                                                                                                                                                          "C:\Users\Admin\Documents\foRa0fxHPD9EhdaaIlFtNFFz.exe"
                                                                                                                                                          6⤵
                                                                                                                                                            PID:3212
                                                                                                                                                          • C:\Users\Admin\Documents\pGJzsUdAt52GN2pgFoSzZJJT.exe
                                                                                                                                                            "C:\Users\Admin\Documents\pGJzsUdAt52GN2pgFoSzZJJT.exe"
                                                                                                                                                            6⤵
                                                                                                                                                              PID:3280
                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 1320
                                                                                                                                                                7⤵
                                                                                                                                                                • Program crash
                                                                                                                                                                PID:1108
                                                                                                                                                            • C:\Users\Admin\Documents\pX_fXD6jb5LCobiAUuClcbK_.exe
                                                                                                                                                              "C:\Users\Admin\Documents\pX_fXD6jb5LCobiAUuClcbK_.exe"
                                                                                                                                                              6⤵
                                                                                                                                                                PID:3372
                                                                                                                                                                • C:\Users\Admin\Documents\pX_fXD6jb5LCobiAUuClcbK_.exe
                                                                                                                                                                  C:\Users\Admin\Documents\pX_fXD6jb5LCobiAUuClcbK_.exe
                                                                                                                                                                  7⤵
                                                                                                                                                                    PID:1912
                                                                                                                                                                • C:\Users\Admin\Documents\oXnj1nEmIfsIowiY0yFCLwdb.exe
                                                                                                                                                                  "C:\Users\Admin\Documents\oXnj1nEmIfsIowiY0yFCLwdb.exe"
                                                                                                                                                                  6⤵
                                                                                                                                                                    PID:3328
                                                                                                                                                                    • C:\Users\Admin\Documents\oXnj1nEmIfsIowiY0yFCLwdb.exe
                                                                                                                                                                      "C:\Users\Admin\Documents\oXnj1nEmIfsIowiY0yFCLwdb.exe"
                                                                                                                                                                      7⤵
                                                                                                                                                                        PID:3432
                                                                                                                                                                    • C:\Users\Admin\Documents\WvjwinKX_TbgBrf9CwDvOgl3.exe
                                                                                                                                                                      "C:\Users\Admin\Documents\WvjwinKX_TbgBrf9CwDvOgl3.exe"
                                                                                                                                                                      6⤵
                                                                                                                                                                        PID:3844
                                                                                                                                                                      • C:\Users\Admin\Documents\Xl5R9NrjUbgABwl_SDhhBA25.exe
                                                                                                                                                                        "C:\Users\Admin\Documents\Xl5R9NrjUbgABwl_SDhhBA25.exe"
                                                                                                                                                                        6⤵
                                                                                                                                                                          PID:3428
                                                                                                                                                                        • C:\Users\Admin\Documents\_4gxVUfXK_s4oHIozMHWidqW.exe
                                                                                                                                                                          "C:\Users\Admin\Documents\_4gxVUfXK_s4oHIozMHWidqW.exe"
                                                                                                                                                                          6⤵
                                                                                                                                                                            PID:2884
                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\2138107.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\2138107.exe"
                                                                                                                                                                              7⤵
                                                                                                                                                                                PID:2816
                                                                                                                                                                                • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                  C:\Windows\system32\WerFault.exe -u -p 2816 -s 1596
                                                                                                                                                                                  8⤵
                                                                                                                                                                                  • Program crash
                                                                                                                                                                                  PID:3568
                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\7896708.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\7896708.exe"
                                                                                                                                                                                7⤵
                                                                                                                                                                                  PID:2684
                                                                                                                                                                              • C:\Users\Admin\Documents\w35Hs1bL7aCRvsVGNs7YSEj8.exe
                                                                                                                                                                                "C:\Users\Admin\Documents\w35Hs1bL7aCRvsVGNs7YSEj8.exe"
                                                                                                                                                                                6⤵
                                                                                                                                                                                  PID:3168
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c taskkill /im "w35Hs1bL7aCRvsVGNs7YSEj8.exe" /f & erase "C:\Users\Admin\Documents\w35Hs1bL7aCRvsVGNs7YSEj8.exe" & exit
                                                                                                                                                                                    7⤵
                                                                                                                                                                                      PID:3800
                                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                        taskkill /im "w35Hs1bL7aCRvsVGNs7YSEj8.exe" /f
                                                                                                                                                                                        8⤵
                                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                                        PID:3756
                                                                                                                                                                                  • C:\Users\Admin\Documents\Mg0cOmopD33TOr7hTWvfKYtp.exe
                                                                                                                                                                                    "C:\Users\Admin\Documents\Mg0cOmopD33TOr7hTWvfKYtp.exe"
                                                                                                                                                                                    6⤵
                                                                                                                                                                                      PID:3208
                                                                                                                                                                                    • C:\Users\Admin\Documents\JdHy1goYOeVLk5Q7kRCgHJSq.exe
                                                                                                                                                                                      "C:\Users\Admin\Documents\JdHy1goYOeVLk5Q7kRCgHJSq.exe"
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:3920
                                                                                                                                                                                        • C:\Users\Admin\Documents\JdHy1goYOeVLk5Q7kRCgHJSq.exe
                                                                                                                                                                                          "C:\Users\Admin\Documents\JdHy1goYOeVLk5Q7kRCgHJSq.exe" -q
                                                                                                                                                                                          7⤵
                                                                                                                                                                                            PID:3752
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-UCVRF.tmp\Inlog.tmp
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-UCVRF.tmp\Inlog.tmp" /SL5="$1027C,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:3008
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:3420
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2960
                                                                                                                                                                                        • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                          icacls "C:\Users\Admin\AppData\Local\b354c246-375e-4735-a329-c440bb06fa99" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                          PID:1672
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\6DEF.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:1732
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\6DEF.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:2336
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build2.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build2.exe"
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                    PID:2984
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build2.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build2.exe"
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                        PID:3192
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 896
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                          PID:2308
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build3.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build3.exe"
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                        PID:2252
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build3.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build3.exe"
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                            PID:2284
                                                                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                                                                                              PID:2516
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\A4B9.exe
                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\A4B9.exe
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:3936
                                                                                                                                                                                                  • C:\Windows\system32\msiexec.exe
                                                                                                                                                                                                    C:\Windows\system32\msiexec.exe /V
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:2300
                                                                                                                                                                                                      • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                        C:\Windows\syswow64\MsiExec.exe -Embedding 5C51F3D7E1BA5FD9DB8E0F9100DE0E26 C
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:3532
                                                                                                                                                                                                        • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                          C:\Windows\syswow64\MsiExec.exe -Embedding AD6C17516BB663D9A418B257A5C934C2
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:1912
                                                                                                                                                                                                          • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                            C:\Windows\syswow64\MsiExec.exe -Embedding F84231D014F08C564222745E0E03DCBB C
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:4944
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\C822.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\C822.exe
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:1084
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\2C2.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\2C2.exe
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:3420
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\9CD0.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\9CD0.exe
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:3644
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\kg3CGktBeq.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\kg3CGktBeq.exe"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:368
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                        • Creates scheduled task(s)
                                                                                                                                                                                                                        PID:4220
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\9CD0.exe"
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:4104
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                                          timeout /T 10 /NOBREAK
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                          • Delays execution with timeout.exe
                                                                                                                                                                                                                          PID:4492
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ZoiMDjODBS.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\ZoiMDjODBS.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:3560
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            cmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:4300
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                          /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                                          PID:2516
                                                                                                                                                                                                                        • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                                          taskeng.exe {5E32E180-3C30-4A79-AFCD-AC355F553CAC} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:916
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:320
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\b354c246-375e-4735-a329-c440bb06fa99\6DEF.exe
                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\b354c246-375e-4735-a329-c440bb06fa99\6DEF.exe --Task
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:4228
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\jchwarj
                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\jchwarj
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:4264
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Setup (15).exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Setup (15).exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                  • Modifies system certificate store
                                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                  PID:1528
                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\zzBlROWSumAUtKJFkVYWdx9t.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\Documents\zzBlROWSumAUtKJFkVYWdx9t.exe"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                    PID:1384
                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\e_wZiDZBvI5cI3n5ujHES0Vr.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\Documents\e_wZiDZBvI5cI3n5ujHES0Vr.exe"
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                    PID:956
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\5758290.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\5758290.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      PID:2392
                                                                                                                                                                                                                                      • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                                                                        C:\Windows\system32\WerFault.exe -u -p 2392 -s 1740
                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                                                        PID:2532
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\6044921.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\6044921.exe"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:2688
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                            PID:2236
                                                                                                                                                                                                                                      • C:\Users\Admin\Documents\Vz5wtW0pBiAoPTjea0cy4FDR.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\Documents\Vz5wtW0pBiAoPTjea0cy4FDR.exe"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                        PID:1708
                                                                                                                                                                                                                                      • C:\Users\Admin\Documents\hh6V5GehBR0eZnYutJsnNTYk.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\Documents\hh6V5GehBR0eZnYutJsnNTYk.exe"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                                                                                        • Checks whether UAC is enabled
                                                                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                        PID:1868
                                                                                                                                                                                                                                      • C:\Users\Admin\Documents\aUGmA5GhTyRz_LmYeXskwDvq.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\Documents\aUGmA5GhTyRz_LmYeXskwDvq.exe"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        PID:1336
                                                                                                                                                                                                                                      • C:\Users\Admin\Documents\Bia420ugUKri_wnCTfXHntNi.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\Documents\Bia420ugUKri_wnCTfXHntNi.exe"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        PID:1264
                                                                                                                                                                                                                                        • C:\Users\Admin\Documents\Bia420ugUKri_wnCTfXHntNi.exe
                                                                                                                                                                                                                                          C:\Users\Admin\Documents\Bia420ugUKri_wnCTfXHntNi.exe
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:3056
                                                                                                                                                                                                                                        • C:\Users\Admin\Documents\jN3XFLlLGgPGNK0obRdDDXkr.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\Documents\jN3XFLlLGgPGNK0obRdDDXkr.exe"
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          • Checks SCSI registry key(s)
                                                                                                                                                                                                                                          PID:1036
                                                                                                                                                                                                                                        • C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe"
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          PID:1656
                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
                                                                                                                                                                                                                                            C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:3036
                                                                                                                                                                                                                                            • C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
                                                                                                                                                                                                                                              C:\Users\Admin\Documents\UBOkY2WTZJNSaNvgEjQ204Gi.exe
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:2168
                                                                                                                                                                                                                                            • C:\Users\Admin\Documents\qwOSNLCcAkt3lGTqdoRjNIUZ.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\Documents\qwOSNLCcAkt3lGTqdoRjNIUZ.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              PID:544
                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\qwOSNLCcAkt3lGTqdoRjNIUZ.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\Documents\qwOSNLCcAkt3lGTqdoRjNIUZ.exe"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:4076
                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\7A_laG0YRHZc9UDiTtzvDv1f.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\Documents\7A_laG0YRHZc9UDiTtzvDv1f.exe"
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                PID:1512
                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\7A_laG0YRHZc9UDiTtzvDv1f.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\Documents\7A_laG0YRHZc9UDiTtzvDv1f.exe
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:3028
                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\FyBOjPNRsEmu9hyyka17XgpS.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\FyBOjPNRsEmu9hyyka17XgpS.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                                                                                                                  • Checks whether UAC is enabled
                                                                                                                                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                  PID:1812
                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\7QDDf6tiHk6uopv5DEZYIjap.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\7QDDf6tiHk6uopv5DEZYIjap.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:1220
                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\llQj5weywNSNnTe2YDxVN6RI.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\llQj5weywNSNnTe2YDxVN6RI.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:1104
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 888
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                    • Program crash
                                                                                                                                                                                                                                                    PID:3656
                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\ITCvR79WOX9SjcIxlSzUHSef.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\ITCvR79WOX9SjcIxlSzUHSef.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:2044
                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\c5j5c0QGDgQVNhuu0qMQ74q1.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\c5j5c0QGDgQVNhuu0qMQ74q1.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:240
                                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\c5j5c0QGDgQVNhuu0qMQ74q1.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\Documents\c5j5c0QGDgQVNhuu0qMQ74q1.exe" -q
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    PID:2292
                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\SG2hNfyIOWdflyWJKD1EdWpw.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\SG2hNfyIOWdflyWJKD1EdWpw.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:1624
                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\0C01piUpZzijT9W_Xv3if3uy.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\0C01piUpZzijT9W_Xv3if3uy.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:1600
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c taskkill /im "0C01piUpZzijT9W_Xv3if3uy.exe" /f & erase "C:\Users\Admin\Documents\0C01piUpZzijT9W_Xv3if3uy.exe" & exit
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:2252
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                        taskkill /im "0C01piUpZzijT9W_Xv3if3uy.exe" /f
                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                                                                                                        PID:2704
                                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\twZjRDPUrLRJsrdU_9Mn09_y.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\Documents\twZjRDPUrLRJsrdU_9Mn09_y.exe"
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    PID:1400
                                                                                                                                                                                                                                                    • C:\Program Files (x86)\Company\NewProduct\jooyu.exe
                                                                                                                                                                                                                                                      "C:\Program Files (x86)\Company\NewProduct\jooyu.exe"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:2876
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                            PID:2884
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                              PID:3892
                                                                                                                                                                                                                                                          • C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
                                                                                                                                                                                                                                                            "C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:2900
                                                                                                                                                                                                                                                            • C:\Program Files (x86)\Company\NewProduct\customer3.exe
                                                                                                                                                                                                                                                              "C:\Program Files (x86)\Company\NewProduct\customer3.exe"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:2920
                                                                                                                                                                                                                                                            • C:\Users\Admin\Documents\VMAdezTAvyqurGwNogekiAab.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\Documents\VMAdezTAvyqurGwNogekiAab.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                                                                              PID:1632
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-EAJ8H.tmp\VMAdezTAvyqurGwNogekiAab.tmp
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-EAJ8H.tmp\VMAdezTAvyqurGwNogekiAab.tmp" /SL5="$10176,138429,56832,C:\Users\Admin\Documents\VMAdezTAvyqurGwNogekiAab.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                PID:2464
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-G4HPS.tmp\Setup.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-G4HPS.tmp\Setup.exe" /Verysilent
                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                    PID:1984
                                                                                                                                                                                                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe
                                                                                                                                                                                                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe"
                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                        PID:1108
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c taskkill /im LGCH2-401_2021-08-18_14-40.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\GameBox INC\GameBox\LGCH2-401_2021-08-18_14-40.exe" & del C:\ProgramData\*.dll & exit
                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                            PID:1696
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                              taskkill /im LGCH2-401_2021-08-18_14-40.exe /f
                                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                                                                                                              PID:3648
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                                                                                              timeout /t 6
                                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                                                                                                                                                              PID:3492
                                                                                                                                                                                                                                                                        • C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe
                                                                                                                                                                                                                                                                          "C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SID=717 CID=717 SILENT=1 /quiet
                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                            PID:2864
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                                                                                                                              "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" SID=717 CID=717 SILENT=1 /quiet AI_SETUPEXEPATH="C:\Program Files (x86)\GameBox INC\GameBox\Cleaner Installation.exe" SETUPEXEDIR="C:\Program Files (x86)\GameBox INC\GameBox\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1629274510 SID=717 CID=717 SILENT=1 /quiet " SID="717" CID="717"
                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                PID:3744
                                                                                                                                                                                                                                                                            • C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe
                                                                                                                                                                                                                                                                              "C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                PID:1016
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-020K0.tmp\WEATHER Manager.tmp
                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-020K0.tmp\WEATHER Manager.tmp" /SL5="$10282,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\WEATHER Manager.exe" /Verysilent
                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                    PID:476
                                                                                                                                                                                                                                                                                • C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe
                                                                                                                                                                                                                                                                                  "C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent
                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                    PID:616
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-KFRHF.tmp\VPN.tmp
                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\is-KFRHF.tmp\VPN.tmp" /SL5="$10288,138429,56832,C:\Program Files (x86)\GameBox INC\GameBox\VPN.exe" /Verysilent
                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                        PID:656
                                                                                                                                                                                                                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe
                                                                                                                                                                                                                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\Inlog.exe" /Verysilent
                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                        PID:556
                                                                                                                                                                                                                                                                                      • C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe
                                                                                                                                                                                                                                                                                        "C:\Program Files (x86)\GameBox INC\GameBox\md7_7dfj.exe"
                                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                                          PID:2500
                                                                                                                                                                                                                                                                                        • C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe
                                                                                                                                                                                                                                                                                          "C:\Program Files (x86)\GameBox INC\GameBox\askinstall53.exe"
                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                            PID:852
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1324
                                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                              • Program crash
                                                                                                                                                                                                                                                                                              PID:3448
                                                                                                                                                                                                                                                                                          • C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe
                                                                                                                                                                                                                                                                                            "C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                              PID:1320
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-RLP3J.tmp\MediaBurner2.tmp
                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-RLP3J.tmp\MediaBurner2.tmp" /SL5="$20176,506086,422400,C:\Program Files (x86)\GameBox INC\GameBox\MediaBurner2.exe"
                                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                                  PID:1420
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-RQC41.tmp\3377047_logo_media.exe
                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\is-RQC41.tmp\3377047_logo_media.exe" /S /UID=burnerch2
                                                                                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                                                                                      PID:3708
                                                                                                                                                                                                                                                                                                      • C:\Program Files\Windows Mail\IBCFXKOELS\ultramediaburner.exe
                                                                                                                                                                                                                                                                                                        "C:\Program Files\Windows Mail\IBCFXKOELS\ultramediaburner.exe" /VERYSILENT
                                                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                                                          PID:3112
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-SSC5K.tmp\ultramediaburner.tmp
                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-SSC5K.tmp\ultramediaburner.tmp" /SL5="$103D8,281924,62464,C:\Program Files\Windows Mail\IBCFXKOELS\ultramediaburner.exe" /VERYSILENT
                                                                                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                                                                                              PID:280
                                                                                                                                                                                                                                                                                                              • C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe
                                                                                                                                                                                                                                                                                                                "C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu
                                                                                                                                                                                                                                                                                                                10⤵
                                                                                                                                                                                                                                                                                                                  PID:3768
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\34-08065-dc5-e5d88-bcc0b132433dd\Lelebibaesi.exe
                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\34-08065-dc5-e5d88-bcc0b132433dd\Lelebibaesi.exe"
                                                                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                                                                PID:2728
                                                                                                                                                                                                                                                                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                                                                                                                                                  "C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
                                                                                                                                                                                                                                                                                                                  9⤵
                                                                                                                                                                                                                                                                                                                    PID:3992
                                                                                                                                                                                                                                                                                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                                                                                                                                                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3992 CREDAT:275457 /prefetch:2
                                                                                                                                                                                                                                                                                                                      10⤵
                                                                                                                                                                                                                                                                                                                        PID:1824
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\260167812.exe
                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\260167812.exe"
                                                                                                                                                                                                                                                                                                                          11⤵
                                                                                                                                                                                                                                                                                                                            PID:2124
                                                                                                                                                                                                                                                                                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                                                                                                                                                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3992 CREDAT:340994 /prefetch:2
                                                                                                                                                                                                                                                                                                                          10⤵
                                                                                                                                                                                                                                                                                                                            PID:4896
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\e6-306e9-bc8-5cc86-5eeb0eb6f355f\Hishaekujola.exe
                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\e6-306e9-bc8-5cc86-5eeb0eb6f355f\Hishaekujola.exe"
                                                                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                                                                          PID:3352
                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe
                                                                                                                                                                                                                                                                                                                    "C:\Program Files (x86)\GameBox INC\GameBox\PBrowFile15.exe"
                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                      PID:804
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\4818658.exe
                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\4818658.exe"
                                                                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                                                                          PID:1724
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\5998488.exe
                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\5998488.exe"
                                                                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                                                                            PID:3028
                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\8951123.exe
                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\8951123.exe"
                                                                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                                                                              PID:3040
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\2907842.exe
                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\2907842.exe"
                                                                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                                                                PID:3268
                                                                                                                                                                                                                                                                                                                            • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                                                                                                                                                                                                                                              "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe"
                                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                                                PID:2300
                                                                                                                                                                                                                                                                                                                                • C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Program Files (x86)\GameBox INC\GameBox\zhaoy-game.exe" -q
                                                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                                                    PID:3676
                                                                                                                                                                                                                                                                                                                                • C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Program Files (x86)\GameBox INC\GameBox\LivelyScreenRecS1.9.exe"
                                                                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                                                                    PID:688
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpF3D_tmp.exe
                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\tmpF3D_tmp.exe"
                                                                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                                                                        PID:3212
                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\dllhost.exe
                                                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\dllhost.exe"
                                                                                                                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                                                                                                                            PID:2956
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /c cmd < Eravate.wks
                                                                                                                                                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                                                                                                                                                              PID:460
                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                cmd
                                                                                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                                                                                  PID:2116
                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                                                                                                                                    findstr /V /R "^ULDdlRJfZsbrDapCbeEYycZEgRIWBtYuQhzBPWvHncPJJvLmMbGEuHBnMZeapMOUzsjfZIMBGWAJGfVSyolrbxqpLUPQTrnLHUdspcArKyXpiRSvrlhqBKbYsrEtT$" Una.wks
                                                                                                                                                                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                                                                                                                                                                      PID:2840
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                                                                                                                                                                                                                                                                      Esplorarne.exe.com i
                                                                                                                                                                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                                                                                                                                                                        PID:3844
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i
                                                                                                                                                                                                                                                                                                                                                          10⤵
                                                                                                                                                                                                                                                                                                                                                            PID:4508
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i
                                                                                                                                                                                                                                                                                                                                                              11⤵
                                                                                                                                                                                                                                                                                                                                                                PID:4272
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Esplorarne.exe.com i
                                                                                                                                                                                                                                                                                                                                                                  12⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:5056
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                                                                              ping MRBKYMNO -n 30
                                                                                                                                                                                                                                                                                                                                                              9⤵
                                                                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                                                                              PID:1776
                                                                                                                                                                                                                                                                                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe
                                                                                                                                                                                                                                                                                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\xtect12.exe"
                                                                                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                                                                                        PID:3096
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\Documents\HqLjJHDlp16O7fstIWyZ4gME.exe
                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\Documents\HqLjJHDlp16O7fstIWyZ4gME.exe"
                                                                                                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                                                                                                            PID:3524
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\KTvSpwR4c2I1J04BSHjsKJtl.exe
                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\Documents\KTvSpwR4c2I1J04BSHjsKJtl.exe"
                                                                                                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                                                                                                              PID:3496
                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\Documents\949vPo5z7m0veFFMj0tFZt9p.exe
                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\Documents\949vPo5z7m0veFFMj0tFZt9p.exe"
                                                                                                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                                                                                                PID:3592
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\949vPo5z7m0veFFMj0tFZt9p.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\Documents\949vPo5z7m0veFFMj0tFZt9p.exe
                                                                                                                                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:3312
                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\zMUGxai64ZwEEMSwuZJPZCiG.exe
                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\zMUGxai64ZwEEMSwuZJPZCiG.exe"
                                                                                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:3564
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\H_C3eVGXMlIGdKQRG45DJ_pd.exe
                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\Documents\H_C3eVGXMlIGdKQRG45DJ_pd.exe"
                                                                                                                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:3608
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe"
                                                                                                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:2780
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:2176
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\Documents\ItWAr5S2pUv8PTeLhZuqzMVM.exe
                                                                                                                                                                                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                                                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                                                                                                            • Checks whether UAC is enabled
                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                            PID:1336
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\Documents\IbP9pOc3nDt97jyJEyQbZvr6.exe
                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\Documents\IbP9pOc3nDt97jyJEyQbZvr6.exe"
                                                                                                                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:1836
                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-7GTKH.tmp\IbP9pOc3nDt97jyJEyQbZvr6.tmp
                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-7GTKH.tmp\IbP9pOc3nDt97jyJEyQbZvr6.tmp" /SL5="$600E8,138429,56832,C:\Users\Admin\Documents\IbP9pOc3nDt97jyJEyQbZvr6.exe"
                                                                                                                                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:2832
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-8BBLQ.tmp\Setup.exe
                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-8BBLQ.tmp\Setup.exe" /Verysilent
                                                                                                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:616
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe
                                                                                                                                                                                                                                                                                                                                                                                      "C:\Program Files (x86)\GameBox INC\GameBox\GameBoxWin64.exe" /qn CAMPAIGN="710"
                                                                                                                                                                                                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:3684
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\a1FFXrcFGxZF73Hu5zscXD4r.exe
                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\a1FFXrcFGxZF73Hu5zscXD4r.exe"
                                                                                                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:3548
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\GE2dmPT8XfEH_UMw1T00auvA.exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\Documents\GE2dmPT8XfEH_UMw1T00auvA.exe"
                                                                                                                                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:3484
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\Documents\foRa0fxHPD9EhdaaIlFtNFFz.exe
                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\Documents\foRa0fxHPD9EhdaaIlFtNFFz.exe"
                                                                                                                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:3212
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\Documents\pGJzsUdAt52GN2pgFoSzZJJT.exe
                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\Documents\pGJzsUdAt52GN2pgFoSzZJJT.exe"
                                                                                                                                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:3280
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 1320
                                                                                                                                                                                                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                                                                                                                                                                                                            PID:1108
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\Documents\pX_fXD6jb5LCobiAUuClcbK_.exe
                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\Documents\pX_fXD6jb5LCobiAUuClcbK_.exe"
                                                                                                                                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:3372
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\Documents\pX_fXD6jb5LCobiAUuClcbK_.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\Documents\pX_fXD6jb5LCobiAUuClcbK_.exe
                                                                                                                                                                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:1912
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\Documents\oXnj1nEmIfsIowiY0yFCLwdb.exe
                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\Documents\oXnj1nEmIfsIowiY0yFCLwdb.exe"
                                                                                                                                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:3328
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\oXnj1nEmIfsIowiY0yFCLwdb.exe
                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\oXnj1nEmIfsIowiY0yFCLwdb.exe"
                                                                                                                                                                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:3432
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\WvjwinKX_TbgBrf9CwDvOgl3.exe
                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\WvjwinKX_TbgBrf9CwDvOgl3.exe"
                                                                                                                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:3844
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\Documents\Xl5R9NrjUbgABwl_SDhhBA25.exe
                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\Documents\Xl5R9NrjUbgABwl_SDhhBA25.exe"
                                                                                                                                                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:3428
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\Documents\_4gxVUfXK_s4oHIozMHWidqW.exe
                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\Documents\_4gxVUfXK_s4oHIozMHWidqW.exe"
                                                                                                                                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:2884
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\2138107.exe
                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\2138107.exe"
                                                                                                                                                                                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:2816
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\WerFault.exe -u -p 2816 -s 1596
                                                                                                                                                                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                                                                                                                                                              • Program crash
                                                                                                                                                                                                                                                                                                                                                                                                              PID:3568
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\7896708.exe
                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\7896708.exe"
                                                                                                                                                                                                                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:2684
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Documents\w35Hs1bL7aCRvsVGNs7YSEj8.exe
                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\Documents\w35Hs1bL7aCRvsVGNs7YSEj8.exe"
                                                                                                                                                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:3168
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /c taskkill /im "w35Hs1bL7aCRvsVGNs7YSEj8.exe" /f & erase "C:\Users\Admin\Documents\w35Hs1bL7aCRvsVGNs7YSEj8.exe" & exit
                                                                                                                                                                                                                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3800
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    taskkill /im "w35Hs1bL7aCRvsVGNs7YSEj8.exe" /f
                                                                                                                                                                                                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3756
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\Documents\Mg0cOmopD33TOr7hTWvfKYtp.exe
                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\Documents\Mg0cOmopD33TOr7hTWvfKYtp.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3208
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\Documents\JdHy1goYOeVLk5Q7kRCgHJSq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\Documents\JdHy1goYOeVLk5Q7kRCgHJSq.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3920
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\Documents\JdHy1goYOeVLk5Q7kRCgHJSq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\Documents\JdHy1goYOeVLk5Q7kRCgHJSq.exe" -q
                                                                                                                                                                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3752
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:3420
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2960
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    icacls "C:\Users\Admin\AppData\Local\b354c246-375e-4735-a329-c440bb06fa99" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:1672
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\6DEF.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1732
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\6DEF.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\6DEF.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2336
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build2.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build2.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2984
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build2.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build2.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3192
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 896
                                                                                                                                                                                                                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    • Program crash
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2308
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build3.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build3.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2252
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build3.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\81db7b04-a5e0-409c-b1e0-280e5bb86de4\build3.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2284
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\A4B9.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\A4B9.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3936
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\msiexec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\msiexec.exe /V
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2300
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\syswow64\MsiExec.exe -Embedding 5C51F3D7E1BA5FD9DB8E0F9100DE0E26 C
                                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3532
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\syswow64\MsiExec.exe -Embedding AD6C17516BB663D9A418B257A5C934C2
                                                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1912
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\syswow64\MsiExec.exe -Embedding F84231D014F08C564222745E0E03DCBB C
                                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4944
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\C822.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\C822.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1084
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\2C2.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\2C2.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3420
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\9CD0.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\9CD0.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3644
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\kg3CGktBeq.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\kg3CGktBeq.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:368
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sqlcmd.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4220
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\9CD0.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4104
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    timeout /T 10 /NOBREAK
                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4492
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ZoiMDjODBS.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\ZoiMDjODBS.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3560
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      cmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat
                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4300
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\taskeng.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    taskeng.exe {5E32E180-3C30-4A79-AFCD-AC355F553CAC} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]
                                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:916
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:320
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\b354c246-375e-4735-a329-c440bb06fa99\6DEF.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\b354c246-375e-4735-a329-c440bb06fa99\6DEF.exe --Task
                                                                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4228
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\jchwarj
                                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\jchwarj
                                                                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4264

                                                                                                                                                                                                                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/956-107-0x0000000000250000-0x000000000026C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            112KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/956-132-0x000000001B070000-0x000000001B072000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/956-98-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/956-107-0x0000000000250000-0x000000000026C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            112KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/956-132-0x000000001B070000-0x000000001B072000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/956-98-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1104-143-0x0000000002D10000-0x0000000002DAD000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            628KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1104-143-0x0000000002D10000-0x0000000002DAD000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            628KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1104-170-0x0000000000400000-0x0000000002D0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            41.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1104-170-0x0000000000400000-0x0000000002D0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            41.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1220-152-0x0000000000160000-0x0000000000172000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            72KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1220-152-0x0000000000160000-0x0000000000172000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            72KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1220-151-0x00000000000F0000-0x0000000000100000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1220-151-0x00000000000F0000-0x0000000000100000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1264-173-0x0000000004740000-0x0000000004741000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1264-173-0x0000000004740000-0x0000000004741000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1264-163-0x00000000000C0000-0x00000000000C1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1264-163-0x00000000000C0000-0x00000000000C1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1336-154-0x00000000003D0000-0x00000000003D1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1336-154-0x00000000003D0000-0x00000000003D1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1384-161-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1384-161-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1512-174-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1512-164-0x0000000001150000-0x0000000001151000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1512-174-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1512-164-0x0000000001150000-0x0000000001151000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1528-61-0x0000000004000000-0x000000000413F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            1.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1528-60-0x0000000076A81000-0x0000000076A83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1528-60-0x0000000076A81000-0x0000000076A83000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1528-61-0x0000000004000000-0x000000000413F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            1.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1600-153-0x0000000000400000-0x00000000023BB000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            31.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1600-153-0x0000000000400000-0x00000000023BB000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            31.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1600-147-0x00000000003B0000-0x00000000003E0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1600-147-0x00000000003B0000-0x00000000003E0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            192KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1632-149-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1632-149-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1656-156-0x0000000000C80000-0x0000000000C81000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1656-156-0x0000000000C80000-0x0000000000C81000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1656-171-0x0000000004940000-0x0000000004941000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1656-171-0x0000000004940000-0x0000000004941000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1708-157-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1708-157-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1812-180-0x0000000001390000-0x0000000001391000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1812-180-0x0000000001390000-0x0000000001391000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1868-155-0x0000000000C60000-0x0000000000C61000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1868-155-0x0000000000C60000-0x0000000000C61000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2044-190-0x0000000003020000-0x000000000303C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            112KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2044-206-0x0000000004710000-0x000000000472A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            104KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2044-190-0x0000000003020000-0x000000000303C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            112KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2044-206-0x0000000004710000-0x000000000472A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            104KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2168-226-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2168-228-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2168-226-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2168-228-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2236-213-0x0000000000070000-0x0000000000071000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2236-213-0x0000000000070000-0x0000000000071000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2392-189-0x00000000010A0000-0x00000000010A1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2392-189-0x00000000010A0000-0x00000000010A1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2392-202-0x00000000003C0000-0x00000000003C1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2392-202-0x00000000003C0000-0x00000000003C1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2392-203-0x0000000000910000-0x0000000000943000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            204KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2392-203-0x0000000000910000-0x0000000000943000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            204KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2392-204-0x00000000003D0000-0x00000000003D1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2392-204-0x00000000003D0000-0x00000000003D1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2464-211-0x000000006E1B1000-0x000000006E1B3000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2464-211-0x000000006E1B1000-0x000000006E1B3000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2688-199-0x00000000011E0000-0x00000000011E1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2688-205-0x0000000000290000-0x0000000000296000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            24KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2688-199-0x00000000011E0000-0x00000000011E1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2688-205-0x0000000000290000-0x0000000000296000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            24KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3028-216-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3028-216-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3028-220-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3028-220-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3056-218-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3056-222-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3056-218-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/3056-222-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                            120KB