Analysis

  • max time kernel
    145s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 16:58

General

  • Target

    64029764c9cc8eedb624ae07f521b550_JaffaCakes118.exe

  • Size

    296KB

  • MD5

    64029764c9cc8eedb624ae07f521b550

  • SHA1

    cd8207bfa3102fcb71ba8262a8200d9c0f566545

  • SHA256

    7c3f59e50e19c3f455795dca0c22a6d2df3589c2b9c9e992b3c00e913f01e5d4

  • SHA512

    7a19a50cbaf4b962265d7bd7e18238d9067cbe296dfee919546d732f15416b29c353f4a78d65de6bc33bbb24a2f4463cae4e25013b7532585bd1b0a5a50a4644

  • SSDEEP

    6144:CkcCwx84nRuEbaKu60ymK1Z7XLlP9a0vvVeh6Zh4Q45vEK:QOEaVemA7k0nY6Hi

Malware Config

Extracted

Family

darkcomet

Botnet

TARGETS

C2

darkjordan.zapto.org:99

Mutex

DC_MUTEX-4HRQL7S

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    6JAyfX7jmXyP

  • install

    true

  • offline_keylogger

    true

  • password

    1983

  • persistence

    false

  • reg_key

    MicroUpdate

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 49 IoCs
  • Sets file to hidden 1 TTPs 64 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • UPX packed file 37 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 49 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of SetThreadContext 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 49 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64029764c9cc8eedb624ae07f521b550_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\64029764c9cc8eedb624ae07f521b550_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\64029764c9cc8eedb624ae07f521b550_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\64029764c9cc8eedb624ae07f521b550_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\64029764c9cc8eedb624ae07f521b550_JaffaCakes118.exe" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp\64029764c9cc8eedb624ae07f521b550_JaffaCakes118.exe" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:2652
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          PID:2212
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
        • Deletes itself
        PID:2948
      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
        "C:\Windows\system32\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
          "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3016
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
            5⤵
              PID:1836
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                6⤵
                  PID:2804
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                5⤵
                  PID:2864
                  • C:\Windows\SysWOW64\attrib.exe
                    attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                    6⤵
                    • Views/modifies file attributes
                    PID:2524
                • C:\Windows\SysWOW64\notepad.exe
                  notepad
                  5⤵
                    PID:1724
                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                    "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of SetWindowsHookEx
                    PID:2920
                    • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                      "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                      6⤵
                      • Modifies WinLogon for persistence
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Drops file in System32 directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:980
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                        7⤵
                          PID:568
                          • C:\Windows\SysWOW64\attrib.exe
                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                            8⤵
                            • Sets file to hidden
                            • Views/modifies file attributes
                            PID:2376
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                          7⤵
                            PID:2008
                            • C:\Windows\SysWOW64\attrib.exe
                              attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                              8⤵
                              • Views/modifies file attributes
                              PID:1392
                          • C:\Windows\SysWOW64\notepad.exe
                            notepad
                            7⤵
                              PID:948
                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                              "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Suspicious use of SetWindowsHookEx
                              PID:2940
                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                8⤵
                                • Modifies WinLogon for persistence
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Adds Run key to start application
                                PID:2180
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                  9⤵
                                    PID:2460
                                    • C:\Windows\SysWOW64\attrib.exe
                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                      10⤵
                                      • Sets file to hidden
                                      PID:1044
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                    9⤵
                                      PID:1736
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                        10⤵
                                          PID:2240
                                      • C:\Windows\SysWOW64\notepad.exe
                                        notepad
                                        9⤵
                                          PID:1460
                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                          9⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Suspicious use of SetWindowsHookEx
                                          PID:576
                                          • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                            "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                            10⤵
                                            • Modifies WinLogon for persistence
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Adds Run key to start application
                                            • Drops file in System32 directory
                                            PID:2368
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                              11⤵
                                                PID:1536
                                                • C:\Windows\SysWOW64\attrib.exe
                                                  attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                  12⤵
                                                  • Sets file to hidden
                                                  PID:2680
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                11⤵
                                                  PID:2032
                                                  • C:\Windows\SysWOW64\attrib.exe
                                                    attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                    12⤵
                                                    • Sets file to hidden
                                                    • Views/modifies file attributes
                                                    PID:2728
                                                • C:\Windows\SysWOW64\notepad.exe
                                                  notepad
                                                  11⤵
                                                    PID:2012
                                                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                    "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                    11⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2544
                                                    • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                      "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                      12⤵
                                                      • Modifies WinLogon for persistence
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Adds Run key to start application
                                                      PID:2820
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                        13⤵
                                                          PID:2948
                                                          • C:\Windows\SysWOW64\attrib.exe
                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                            14⤵
                                                            • Sets file to hidden
                                                            • Views/modifies file attributes
                                                            PID:1804
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                          13⤵
                                                            PID:2596
                                                            • C:\Windows\SysWOW64\attrib.exe
                                                              attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                              14⤵
                                                              • Sets file to hidden
                                                              PID:3032
                                                          • C:\Windows\SysWOW64\notepad.exe
                                                            notepad
                                                            13⤵
                                                              PID:2300
                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                              "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                              13⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2416
                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                14⤵
                                                                • Modifies WinLogon for persistence
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Adds Run key to start application
                                                                • Drops file in System32 directory
                                                                PID:1724
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                  15⤵
                                                                    PID:1400
                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                      16⤵
                                                                      • Sets file to hidden
                                                                      • Views/modifies file attributes
                                                                      PID:2312
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                    15⤵
                                                                      PID:1908
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                        16⤵
                                                                        • Drops file in System32 directory
                                                                        • Views/modifies file attributes
                                                                        PID:1788
                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                      notepad
                                                                      15⤵
                                                                        PID:1912
                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                        "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                        15⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetThreadContext
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:772
                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                          "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                          16⤵
                                                                          • Modifies WinLogon for persistence
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Adds Run key to start application
                                                                          • Drops file in System32 directory
                                                                          PID:912
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                            17⤵
                                                                              PID:1512
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                18⤵
                                                                                • Sets file to hidden
                                                                                PID:1528
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                              17⤵
                                                                                PID:2000
                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                  18⤵
                                                                                  • Drops file in System32 directory
                                                                                  • Views/modifies file attributes
                                                                                  PID:688
                                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                                notepad
                                                                                17⤵
                                                                                  PID:2360
                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                  "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                  17⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2972
                                                                                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                    "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                    18⤵
                                                                                    • Modifies WinLogon for persistence
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Adds Run key to start application
                                                                                    • Drops file in System32 directory
                                                                                    PID:1596
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                      19⤵
                                                                                        PID:2292
                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                          20⤵
                                                                                          • Drops file in System32 directory
                                                                                          • Views/modifies file attributes
                                                                                          PID:2516
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                        19⤵
                                                                                          PID:2112
                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                            20⤵
                                                                                            • Sets file to hidden
                                                                                            • Views/modifies file attributes
                                                                                            PID:2908
                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                          notepad
                                                                                          19⤵
                                                                                            PID:2772
                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                            "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                            19⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:3068
                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                              "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                              20⤵
                                                                                              • Modifies WinLogon for persistence
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              • Adds Run key to start application
                                                                                              PID:396
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                21⤵
                                                                                                  PID:2876
                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                    22⤵
                                                                                                    • Sets file to hidden
                                                                                                    PID:1988
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                  21⤵
                                                                                                    PID:1280
                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                      22⤵
                                                                                                      • Sets file to hidden
                                                                                                      • Views/modifies file attributes
                                                                                                      PID:2716
                                                                                                  • C:\Windows\SysWOW64\notepad.exe
                                                                                                    notepad
                                                                                                    21⤵
                                                                                                      PID:2464
                                                                                                    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                      "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                      21⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:1784
                                                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                        "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                        22⤵
                                                                                                        • Modifies WinLogon for persistence
                                                                                                        • Executes dropped EXE
                                                                                                        • Loads dropped DLL
                                                                                                        • Adds Run key to start application
                                                                                                        • Drops file in System32 directory
                                                                                                        PID:2104
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                          23⤵
                                                                                                            PID:2920
                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                              attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                              24⤵
                                                                                                              • Views/modifies file attributes
                                                                                                              PID:2360
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                            23⤵
                                                                                                              PID:2312
                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                24⤵
                                                                                                                • Sets file to hidden
                                                                                                                • Drops file in System32 directory
                                                                                                                • Views/modifies file attributes
                                                                                                                PID:768
                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                              notepad
                                                                                                              23⤵
                                                                                                                PID:1152
                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                23⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:1776
                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                  "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                  24⤵
                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Loads dropped DLL
                                                                                                                  • Adds Run key to start application
                                                                                                                  • Drops file in System32 directory
                                                                                                                  PID:1036
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                    25⤵
                                                                                                                      PID:2980
                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                        26⤵
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:1572
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                      25⤵
                                                                                                                        PID:1960
                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                          26⤵
                                                                                                                          • Sets file to hidden
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Views/modifies file attributes
                                                                                                                          PID:2116
                                                                                                                      • C:\Windows\SysWOW64\notepad.exe
                                                                                                                        notepad
                                                                                                                        25⤵
                                                                                                                          PID:1408
                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                          "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                          25⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                          PID:2500
                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                            "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                            26⤵
                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Adds Run key to start application
                                                                                                                            • Drops file in System32 directory
                                                                                                                            PID:2584
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                              27⤵
                                                                                                                                PID:1792
                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                  28⤵
                                                                                                                                  • Sets file to hidden
                                                                                                                                  PID:836
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                27⤵
                                                                                                                                  PID:1452
                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                    28⤵
                                                                                                                                    • Sets file to hidden
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:924
                                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                  notepad
                                                                                                                                  27⤵
                                                                                                                                    PID:2408
                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                    "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                    27⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                    PID:2416
                                                                                                                                    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                      "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                      28⤵
                                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      • Adds Run key to start application
                                                                                                                                      PID:2400
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                        29⤵
                                                                                                                                          PID:2160
                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                            30⤵
                                                                                                                                            • Views/modifies file attributes
                                                                                                                                            PID:1556
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                          29⤵
                                                                                                                                            PID:2340
                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                              attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                              30⤵
                                                                                                                                              • Sets file to hidden
                                                                                                                                              PID:1028
                                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                            notepad
                                                                                                                                            29⤵
                                                                                                                                              PID:1260
                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                              "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                              29⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                              PID:1272
                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                30⤵
                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                • Adds Run key to start application
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                PID:1620
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                  31⤵
                                                                                                                                                    PID:2232
                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                      32⤵
                                                                                                                                                      • Sets file to hidden
                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                      PID:2752
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                    31⤵
                                                                                                                                                      PID:2208
                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                        32⤵
                                                                                                                                                        • Sets file to hidden
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        PID:2140
                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                      notepad
                                                                                                                                                      31⤵
                                                                                                                                                        PID:2364
                                                                                                                                                      • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                        "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                        31⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:1800
                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                          "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                          32⤵
                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          PID:3024
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                            33⤵
                                                                                                                                                              PID:2840
                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                34⤵
                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                PID:1476
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                              33⤵
                                                                                                                                                                PID:2648
                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                  34⤵
                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                  PID:2076
                                                                                                                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                notepad
                                                                                                                                                                33⤵
                                                                                                                                                                  PID:624
                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                  33⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                  PID:1964
                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                    "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                    34⤵
                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    PID:2516
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                      35⤵
                                                                                                                                                                        PID:948
                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                          36⤵
                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                          PID:2956
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                        35⤵
                                                                                                                                                                          PID:2464
                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                            36⤵
                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                            PID:1812
                                                                                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                          notepad
                                                                                                                                                                          35⤵
                                                                                                                                                                            PID:1392
                                                                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                            "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                            35⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                            PID:2388
                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                              "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                              36⤵
                                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                              PID:2452
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                37⤵
                                                                                                                                                                                  PID:1048
                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                    38⤵
                                                                                                                                                                                    • Sets file to hidden
                                                                                                                                                                                    • Views/modifies file attributes
                                                                                                                                                                                    PID:2296
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                  37⤵
                                                                                                                                                                                    PID:2176
                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                      38⤵
                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                      PID:1532
                                                                                                                                                                                  • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                    notepad
                                                                                                                                                                                    37⤵
                                                                                                                                                                                      PID:1628
                                                                                                                                                                                    • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                      "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                      37⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                      PID:2240
                                                                                                                                                                                      • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                        "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                        38⤵
                                                                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        PID:3032
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                          39⤵
                                                                                                                                                                                            PID:2652
                                                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                              attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                              40⤵
                                                                                                                                                                                              • Sets file to hidden
                                                                                                                                                                                              PID:1680
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                            39⤵
                                                                                                                                                                                              PID:3028
                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                40⤵
                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                PID:936
                                                                                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                              notepad
                                                                                                                                                                                              39⤵
                                                                                                                                                                                                PID:1688
                                                                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                39⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                PID:1540
                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                  "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                  40⤵
                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  PID:1352
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                    41⤵
                                                                                                                                                                                                      PID:2944
                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                        42⤵
                                                                                                                                                                                                          PID:2928
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                        41⤵
                                                                                                                                                                                                          PID:2960
                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                            42⤵
                                                                                                                                                                                                              PID:2456
                                                                                                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                            notepad
                                                                                                                                                                                                            41⤵
                                                                                                                                                                                                              PID:1028
                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                              "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                              41⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                              PID:1608
                                                                                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                42⤵
                                                                                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                PID:2188
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                  43⤵
                                                                                                                                                                                                                    PID:1800
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                      44⤵
                                                                                                                                                                                                                      • Sets file to hidden
                                                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                                                      PID:2404
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                    43⤵
                                                                                                                                                                                                                      PID:2040
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                        44⤵
                                                                                                                                                                                                                          PID:1476
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                        notepad
                                                                                                                                                                                                                        43⤵
                                                                                                                                                                                                                          PID:2852
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                          "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                          43⤵
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                          PID:2764
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                            "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                            44⤵
                                                                                                                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                            PID:2064
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                              45⤵
                                                                                                                                                                                                                                PID:756
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                  46⤵
                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                  PID:2988
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                45⤵
                                                                                                                                                                                                                                  PID:1260
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                    46⤵
                                                                                                                                                                                                                                    • Sets file to hidden
                                                                                                                                                                                                                                    • Views/modifies file attributes
                                                                                                                                                                                                                                    PID:2712
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                  notepad
                                                                                                                                                                                                                                  45⤵
                                                                                                                                                                                                                                    PID:1196
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                    "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                    45⤵
                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                    PID:236
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                      "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                      46⤵
                                                                                                                                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                      PID:2936
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                        47⤵
                                                                                                                                                                                                                                          PID:2140
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                            48⤵
                                                                                                                                                                                                                                              PID:2600
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                            47⤵
                                                                                                                                                                                                                                              PID:2996
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                48⤵
                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                                                PID:2636
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                              notepad
                                                                                                                                                                                                                                              47⤵
                                                                                                                                                                                                                                                PID:1604
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                47⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                PID:2772
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                  "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                  48⤵
                                                                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                  PID:2124
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                    49⤵
                                                                                                                                                                                                                                                      PID:1688
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                        50⤵
                                                                                                                                                                                                                                                          PID:1564
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                        49⤵
                                                                                                                                                                                                                                                          PID:2380
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                            50⤵
                                                                                                                                                                                                                                                              PID:940
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                            notepad
                                                                                                                                                                                                                                                            49⤵
                                                                                                                                                                                                                                                              PID:2416
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                              "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                              49⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                              PID:2016
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                50⤵
                                                                                                                                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                PID:876
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                  51⤵
                                                                                                                                                                                                                                                                    PID:1040
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                      52⤵
                                                                                                                                                                                                                                                                        PID:1500
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                      51⤵
                                                                                                                                                                                                                                                                        PID:2360
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                          52⤵
                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                          PID:1776
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                        notepad
                                                                                                                                                                                                                                                                        51⤵
                                                                                                                                                                                                                                                                          PID:1508
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                          51⤵
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                          PID:2396
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                            "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                            52⤵
                                                                                                                                                                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                                                            PID:2404
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                              53⤵
                                                                                                                                                                                                                                                                                PID:1796
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                  54⤵
                                                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                                                                  PID:1648
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                53⤵
                                                                                                                                                                                                                                                                                  PID:1540
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                    54⤵
                                                                                                                                                                                                                                                                                    • Views/modifies file attributes
                                                                                                                                                                                                                                                                                    PID:2928
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                  notepad
                                                                                                                                                                                                                                                                                  53⤵
                                                                                                                                                                                                                                                                                    PID:956
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                    "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                    53⤵
                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                    PID:1528
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                      "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                      54⤵
                                                                                                                                                                                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                                                                                                      PID:2792
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                        55⤵
                                                                                                                                                                                                                                                                                          PID:2308
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                            56⤵
                                                                                                                                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                                                                            PID:1052
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                          55⤵
                                                                                                                                                                                                                                                                                            PID:808
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                              attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                              56⤵
                                                                                                                                                                                                                                                                                              • Sets file to hidden
                                                                                                                                                                                                                                                                                              • Views/modifies file attributes
                                                                                                                                                                                                                                                                                              PID:1812
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                            notepad
                                                                                                                                                                                                                                                                                            55⤵
                                                                                                                                                                                                                                                                                              PID:3000
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                              "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                              55⤵
                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                              PID:2956
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                56⤵
                                                                                                                                                                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                                                                                                                PID:2296
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                  57⤵
                                                                                                                                                                                                                                                                                                    PID:1912
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                      58⤵
                                                                                                                                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                      PID:1776
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                    57⤵
                                                                                                                                                                                                                                                                                                      PID:772
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                        58⤵
                                                                                                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                        PID:2256
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                      notepad
                                                                                                                                                                                                                                                                                                      57⤵
                                                                                                                                                                                                                                                                                                        PID:1156
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                        "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                        57⤵
                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                        PID:3052
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                          "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                          58⤵
                                                                                                                                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                          PID:2772
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                            59⤵
                                                                                                                                                                                                                                                                                                              PID:1360
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                60⤵
                                                                                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                PID:684
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                              59⤵
                                                                                                                                                                                                                                                                                                                PID:1052
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                  60⤵
                                                                                                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                  PID:2600
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                notepad
                                                                                                                                                                                                                                                                                                                59⤵
                                                                                                                                                                                                                                                                                                                  PID:2964
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                  59⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                  PID:284
                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                    "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                    60⤵
                                                                                                                                                                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                    PID:1156
                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                      61⤵
                                                                                                                                                                                                                                                                                                                        PID:1100
                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                          62⤵
                                                                                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                          PID:1044
                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                        61⤵
                                                                                                                                                                                                                                                                                                                          PID:2248
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                            62⤵
                                                                                                                                                                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                            PID:2964
                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                          notepad
                                                                                                                                                                                                                                                                                                                          61⤵
                                                                                                                                                                                                                                                                                                                            PID:2288
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                            61⤵
                                                                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                            PID:2740
                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                              "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                              62⤵
                                                                                                                                                                                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                              PID:684
                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                63⤵
                                                                                                                                                                                                                                                                                                                                  PID:2212
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                    64⤵
                                                                                                                                                                                                                                                                                                                                    • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                    • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                    PID:2928
                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                  63⤵
                                                                                                                                                                                                                                                                                                                                    PID:2636
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                      64⤵
                                                                                                                                                                                                                                                                                                                                      • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                      PID:944
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                    notepad
                                                                                                                                                                                                                                                                                                                                    63⤵
                                                                                                                                                                                                                                                                                                                                      PID:1608
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                      "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                      63⤵
                                                                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                      PID:2076
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                        "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                        64⤵
                                                                                                                                                                                                                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                        PID:2740
                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                          65⤵
                                                                                                                                                                                                                                                                                                                                            PID:2704
                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                              attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                              66⤵
                                                                                                                                                                                                                                                                                                                                              • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                              PID:2116
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                            65⤵
                                                                                                                                                                                                                                                                                                                                              PID:2908
                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                66⤵
                                                                                                                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                PID:936
                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                              notepad
                                                                                                                                                                                                                                                                                                                                              65⤵
                                                                                                                                                                                                                                                                                                                                                PID:3008
                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                65⤵
                                                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                PID:944
                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                  66⤵
                                                                                                                                                                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                  PID:1788
                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                    67⤵
                                                                                                                                                                                                                                                                                                                                                      PID:276
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                        68⤵
                                                                                                                                                                                                                                                                                                                                                          PID:1572
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                        67⤵
                                                                                                                                                                                                                                                                                                                                                          PID:1592
                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                            68⤵
                                                                                                                                                                                                                                                                                                                                                              PID:236
                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                            notepad
                                                                                                                                                                                                                                                                                                                                                            67⤵
                                                                                                                                                                                                                                                                                                                                                              PID:1976
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                              67⤵
                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                              PID:2572
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                68⤵
                                                                                                                                                                                                                                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                PID:3008
                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                  69⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:2116
                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                      70⤵
                                                                                                                                                                                                                                                                                                                                                                      • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                      PID:3140
                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                    69⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:1964
                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                        70⤵
                                                                                                                                                                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                        PID:3160
                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                      notepad
                                                                                                                                                                                                                                                                                                                                                                      69⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:1556
                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                        69⤵
                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                        PID:3096
                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                          70⤵
                                                                                                                                                                                                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                          PID:3176
                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                            71⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:3232
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                72⤵
                                                                                                                                                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                PID:3452
                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                              71⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:3240
                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                  72⤵
                                                                                                                                                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                  PID:3460
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                notepad
                                                                                                                                                                                                                                                                                                                                                                                71⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:3256
                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                  71⤵
                                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                  PID:3400
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                    72⤵
                                                                                                                                                                                                                                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                    PID:3480
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                      73⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:3528
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                          74⤵
                                                                                                                                                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                          PID:3744
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                        73⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:3536
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                            74⤵
                                                                                                                                                                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                            PID:3760
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                          notepad
                                                                                                                                                                                                                                                                                                                                                                                          73⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:3544
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                            73⤵
                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                            PID:3684
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                              74⤵
                                                                                                                                                                                                                                                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                              PID:3776
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                75⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:3828
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                    76⤵
                                                                                                                                                                                                                                                                                                                                                                                                    • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                    • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                    PID:4044
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                  75⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:3844
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                      76⤵
                                                                                                                                                                                                                                                                                                                                                                                                      • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                      PID:4056
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                    notepad
                                                                                                                                                                                                                                                                                                                                                                                                    75⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:3856
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                      75⤵
                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                      PID:4000
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                        76⤵
                                                                                                                                                                                                                                                                                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                                        PID:4076
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                          77⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:1700
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                              attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                              78⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:3288
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                              77⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:3084
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                  78⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3308
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                notepad
                                                                                                                                                                                                                                                                                                                                                                                                                77⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2168
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                  77⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3140
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                    78⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3272
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                      79⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3344
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                          80⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3604
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                        79⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3352
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                            80⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3624
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          notepad
                                                                                                                                                                                                                                                                                                                                                                                                                          79⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3228
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                            79⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3512
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                              80⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3648
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                81⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3568
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                    82⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3960
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                    81⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3596
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                        82⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3968
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                      81⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3652
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                        81⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3900
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                          82⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3996
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                            83⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4024
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                84⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3116
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                              83⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4048
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                  84⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3152
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                83⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3772
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                  83⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1648
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                    84⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3184
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                      85⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3396
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                          86⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3588
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                        85⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3392
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                            86⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3468
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                          85⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3164
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                            85⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3448
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                              86⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3364
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                87⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3576
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    88⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3980
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    87⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3564
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        88⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3820
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      87⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3692
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        87⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3964
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          88⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4012
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            89⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4084
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                90⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3252
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              89⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4004
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  90⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3204
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                89⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2376
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  89⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2168
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    90⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3296
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      91⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3260
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          92⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3688
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        91⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3216
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            92⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3796
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          91⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3200
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            91⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3700
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              92⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3840
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                93⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3544
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    94⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3120
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  93⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3228
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      94⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3984
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    93⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3980
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      93⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2524
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        94⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1820
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          95⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3168
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              96⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3764
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            95⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3284
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                96⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3456
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              95⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3224
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                95⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3636
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  96⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3420
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    97⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3200
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        98⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2240
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      97⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3812
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          98⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2288
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        97⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3884
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          97⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4040
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            98⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3772
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              99⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2376
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  100⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3328
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                99⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3988
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    100⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3636
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  99⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3124
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    99⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3524
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      100⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3700
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          101⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3820
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              102⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:2344
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            101⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4028
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                102⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3512
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              101⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4068
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                101⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3868
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    102⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2396
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        103⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3428
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            104⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3896
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          103⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3504
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              104⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:236
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            103⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3588
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\system32\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              103⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1364
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  104⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:944
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      105⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3888
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP\msdcsc.exe" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          106⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3124
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        105⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3904
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\MSDCSC\6JAyfX7jmXyP\6JAyfX7jmXyP" +s +h
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            106⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3140
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            notepad
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            105⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3780
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              105⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3752

                                                                                                                                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                                                                                                                                              • \Windows\SysWOW64\MSDCSC\msdcsc.exe

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                296KB

                                                                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                                                                64029764c9cc8eedb624ae07f521b550

                                                                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                                                                cd8207bfa3102fcb71ba8262a8200d9c0f566545

                                                                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                                                                7c3f59e50e19c3f455795dca0c22a6d2df3589c2b9c9e992b3c00e913f01e5d4

                                                                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                                                                7a19a50cbaf4b962265d7bd7e18238d9067cbe296dfee919546d732f15416b29c353f4a78d65de6bc33bbb24a2f4463cae4e25013b7532585bd1b0a5a50a4644

                                                                                                                                                                                                                                                                                                                                                              • memory/396-487-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/396-646-0x00000000033A0000-0x00000000035D5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/396-529-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/396-530-0x00000000033A0000-0x00000000035D5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/576-215-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/576-205-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/772-368-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/772-379-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/912-377-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/912-420-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/912-422-0x0000000003170000-0x00000000033A5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/912-542-0x0000000003170000-0x00000000033A5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/980-149-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/980-264-0x0000000003490000-0x00000000036C5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/980-106-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/980-104-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/1036-595-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/1036-639-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/1596-432-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/1596-476-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/1628-0-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/1628-7-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/1724-367-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/1776-598-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/1776-589-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/1784-541-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/1784-531-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2104-709-0x0000000003400000-0x0000000003635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2104-586-0x0000000003400000-0x0000000003635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2104-585-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2104-543-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2152-4-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2152-11-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2152-3-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2152-10-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2152-9-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2152-5-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2152-42-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2152-8-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2180-159-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2180-203-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2368-217-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2368-259-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2416-706-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2416-325-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2416-316-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2500-654-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2500-643-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2544-272-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2544-260-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2584-695-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2584-696-0x0000000003290000-0x00000000034C5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2584-651-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2708-43-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2708-53-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2820-427-0x0000000003240000-0x0000000003475000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2820-269-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2820-315-0x0000000003240000-0x0000000003475000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2820-312-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2920-108-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2920-97-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2940-162-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2940-151-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2948-32-0x00000000001C0000-0x00000000001C1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2948-14-0x0000000000080000-0x0000000000081000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                                                                                              • memory/2972-424-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/2972-435-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/3016-96-0x0000000003320000-0x0000000003555000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/3016-50-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/3016-51-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/3016-92-0x0000000000630000-0x0000000000634000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                16KB

                                                                                                                                                                                                                                                                                                                                                              • memory/3016-94-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                744KB

                                                                                                                                                                                                                                                                                                                                                              • memory/3016-206-0x0000000003320000-0x0000000003555000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB

                                                                                                                                                                                                                                                                                                                                                              • memory/3068-642-0x0000000000400000-0x0000000000635000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                                                                                                2.2MB