Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 22:17

General

  • Target

    9e9ce882d8ce63520122f37c16cc256ec0365efa288f12e12cf1a25d81ad14deN.exe

  • Size

    4.9MB

  • MD5

    4331bb6448c6da37580f2ac382b45750

  • SHA1

    4516ce7712311a62a03c332aec5d0dec7513efc3

  • SHA256

    9e9ce882d8ce63520122f37c16cc256ec0365efa288f12e12cf1a25d81ad14de

  • SHA512

    9ee79af2228dacf6294a06a069f3ef4addd897bfcd930d7c78a51062dec60ef611edcb3332f3d8181188b029dbc2635e1e35a8a2f6b8c88cb348f967da8a1b9a

  • SSDEEP

    49152:jl5MTGChZpxtlBBgxchXb/zqP6DUtRgs5q289dAnSz44hnW1XgnYu6fYmPkMSx8E:

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

rc4.plain

Signatures

  • Colibri Loader

    A loader sold as MaaS first seen in August 2021.

  • DcRat 43 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 39 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 45 IoCs
  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 22 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 50 IoCs
  • Checks whether UAC is enabled 1 TTPs 30 IoCs
  • Suspicious use of SetThreadContext 15 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 16 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 39 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 45 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e9ce882d8ce63520122f37c16cc256ec0365efa288f12e12cf1a25d81ad14deN.exe
    "C:\Users\Admin\AppData\Local\Temp\9e9ce882d8ce63520122f37c16cc256ec0365efa288f12e12cf1a25d81ad14deN.exe"
    1⤵
    • DcRat
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1884
    • C:\Users\Admin\AppData\Local\Temp\tmp355A.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp355A.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4428
      • C:\Users\Admin\AppData\Local\Temp\tmp355A.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp355A.tmp.exe"
        3⤵
        • Executes dropped EXE
        PID:4472
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5048
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4864
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2668
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2960
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2760
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3496
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:756
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2020
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:392
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3620
    • C:\Users\Admin\AppData\Local\Temp\9e9ce882d8ce63520122f37c16cc256ec0365efa288f12e12cf1a25d81ad14deN.exe
      "C:\Users\Admin\AppData\Local\Temp\9e9ce882d8ce63520122f37c16cc256ec0365efa288f12e12cf1a25d81ad14deN.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\tmp494B.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp494B.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Users\Admin\AppData\Local\Temp\tmp494B.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp494B.tmp.exe"
          4⤵
          • Executes dropped EXE
          PID:1144
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:848
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4644
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3828
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1744
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2484
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4548
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:8
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:4356
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\z3INVnGHGt.bat"
        3⤵
          PID:4920
          • C:\Windows\system32\w32tm.exe
            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
            4⤵
              PID:4016
            • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
              4⤵
              • UAC bypass
              • Checks computer location settings
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • System policy modification
              PID:5040
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7dc22e41-9e88-491d-ac10-fef1841c82bb.vbs"
                5⤵
                  PID:4380
                  • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                    "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                    6⤵
                    • UAC bypass
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • System policy modification
                    PID:4344
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1f25d2f7-1cef-48e2-a7fb-772482ae30af.vbs"
                      7⤵
                        PID:3936
                        • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                          "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                          8⤵
                          • UAC bypass
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • System policy modification
                          PID:4480
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\68c6e7b1-3bff-4c81-b9ca-f3d2cea3074e.vbs"
                            9⤵
                              PID:3016
                              • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                10⤵
                                • UAC bypass
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Checks whether UAC is enabled
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • System policy modification
                                PID:1432
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c774b6e6-4c35-4230-8e0a-61b917ae855e.vbs"
                                  11⤵
                                    PID:2920
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                      12⤵
                                      • UAC bypass
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • System policy modification
                                      PID:3304
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a044f550-3ef2-4acb-a020-7a919bc448d3.vbs"
                                        13⤵
                                          PID:516
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                            14⤵
                                            • UAC bypass
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Checks whether UAC is enabled
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            • System policy modification
                                            PID:4860
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0fea41a1-adce-4801-ae11-11df08e65b49.vbs"
                                              15⤵
                                                PID:4816
                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                                  16⤵
                                                  • UAC bypass
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Checks whether UAC is enabled
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • System policy modification
                                                  PID:2084
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5dd44dee-eda3-41e6-bf9a-1419075da06d.vbs"
                                                    17⤵
                                                      PID:3012
                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                                        18⤵
                                                        • UAC bypass
                                                        • Checks computer location settings
                                                        • Executes dropped EXE
                                                        • Checks whether UAC is enabled
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • System policy modification
                                                        PID:3612
                                                        • C:\Windows\System32\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6a20ecc4-6ea1-48c0-9090-9f48775be726.vbs"
                                                          19⤵
                                                            PID:4544
                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                                              20⤵
                                                              • UAC bypass
                                                              • Checks computer location settings
                                                              • Executes dropped EXE
                                                              • Checks whether UAC is enabled
                                                              • Modifies registry class
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • System policy modification
                                                              PID:2708
                                                              • C:\Windows\System32\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\33037f9a-a8cc-45a6-9a22-fbafa0677f64.vbs"
                                                                21⤵
                                                                  PID:2956
                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                                                    22⤵
                                                                    • UAC bypass
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Checks whether UAC is enabled
                                                                    • Modifies registry class
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    • System policy modification
                                                                    PID:4884
                                                                    • C:\Windows\System32\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8cce6f7f-e3af-4eee-b6e2-1da63106d84b.vbs"
                                                                      23⤵
                                                                        PID:388
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                                                          24⤵
                                                                          • UAC bypass
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Checks whether UAC is enabled
                                                                          • Modifies registry class
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • System policy modification
                                                                          PID:3844
                                                                          • C:\Windows\System32\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\07fdc6c2-fb1f-4db9-a217-a75c29b82b91.vbs"
                                                                            25⤵
                                                                              PID:4524
                                                                              • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                                                                "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                                                                26⤵
                                                                                • UAC bypass
                                                                                • Checks computer location settings
                                                                                • Executes dropped EXE
                                                                                • Checks whether UAC is enabled
                                                                                • Modifies registry class
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • System policy modification
                                                                                PID:4768
                                                                                • C:\Windows\System32\WScript.exe
                                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7f453dba-06e0-4d3d-8922-2fdb4596c15c.vbs"
                                                                                  27⤵
                                                                                    PID:2384
                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe
                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe"
                                                                                      28⤵
                                                                                      • UAC bypass
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Checks whether UAC is enabled
                                                                                      • Modifies registry class
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • System policy modification
                                                                                      PID:4880
                                                                                      • C:\Windows\System32\WScript.exe
                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\74a8df54-596b-452f-9eb5-f1d61d1b3fb3.vbs"
                                                                                        29⤵
                                                                                          PID:3752
                                                                                        • C:\Windows\System32\WScript.exe
                                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e9c8fe1a-f204-419d-8df0-59dd144ce4ac.vbs"
                                                                                          29⤵
                                                                                            PID:440
                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp6FF4.tmp.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\tmp6FF4.tmp.exe"
                                                                                            29⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2708
                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp6FF4.tmp.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\tmp6FF4.tmp.exe"
                                                                                              30⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:1444
                                                                                      • C:\Windows\System32\WScript.exe
                                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\03671351-31eb-41ae-b998-c3cda8584deb.vbs"
                                                                                        27⤵
                                                                                          PID:1568
                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp5373.tmp.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\tmp5373.tmp.exe"
                                                                                          27⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:880
                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp5373.tmp.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\tmp5373.tmp.exe"
                                                                                            28⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2880
                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp5373.tmp.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\tmp5373.tmp.exe"
                                                                                              29⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:3548
                                                                                    • C:\Windows\System32\WScript.exe
                                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fa91e1d0-70ed-4af7-a773-738ca0c9cb2b.vbs"
                                                                                      25⤵
                                                                                        PID:644
                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmp238A.tmp.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\tmp238A.tmp.exe"
                                                                                        25⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:3620
                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp238A.tmp.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\tmp238A.tmp.exe"
                                                                                          26⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2336
                                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp238A.tmp.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\tmp238A.tmp.exe"
                                                                                            27⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4540
                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp238A.tmp.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\tmp238A.tmp.exe"
                                                                                              28⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:4724
                                                                                  • C:\Windows\System32\WScript.exe
                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\6415e01f-ee64-4f7a-aa6a-1db17dee74a6.vbs"
                                                                                    23⤵
                                                                                      PID:2636
                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmp7F3.tmp.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\tmp7F3.tmp.exe"
                                                                                      23⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:2404
                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmp7F3.tmp.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\tmp7F3.tmp.exe"
                                                                                        24⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:968
                                                                                • C:\Windows\System32\WScript.exe
                                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\00929806-95fa-4cd8-ba95-803e1be2d416.vbs"
                                                                                  21⤵
                                                                                    PID:1188
                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpEC3D.tmp.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\tmpEC3D.tmp.exe"
                                                                                    21⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2220
                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpEC3D.tmp.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\tmpEC3D.tmp.exe"
                                                                                      22⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:440
                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpEC3D.tmp.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\tmpEC3D.tmp.exe"
                                                                                        23⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:1956
                                                                              • C:\Windows\System32\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2e36010c-b439-405f-9882-a5494d5b3cbd.vbs"
                                                                                19⤵
                                                                                  PID:4324
                                                                                • C:\Users\Admin\AppData\Local\Temp\tmpD0A7.tmp.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\tmpD0A7.tmp.exe"
                                                                                  19⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2732
                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpD0A7.tmp.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\tmpD0A7.tmp.exe"
                                                                                    20⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2008
                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpD0A7.tmp.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\tmpD0A7.tmp.exe"
                                                                                      21⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:2784
                                                                            • C:\Windows\System32\WScript.exe
                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\88f7280a-1daf-4df0-866a-07d1296fa7b3.vbs"
                                                                              17⤵
                                                                                PID:2912
                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpB465.tmp.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\tmpB465.tmp.exe"
                                                                                17⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:4744
                                                                                • C:\Users\Admin\AppData\Local\Temp\tmpB465.tmp.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\tmpB465.tmp.exe"
                                                                                  18⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4944
                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpB465.tmp.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\tmpB465.tmp.exe"
                                                                                    19⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:2644
                                                                          • C:\Windows\System32\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\e1fde603-cd4b-4b6d-8a6a-86bd78fd9d31.vbs"
                                                                            15⤵
                                                                              PID:2100
                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp848B.tmp.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\tmp848B.tmp.exe"
                                                                              15⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetThreadContext
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:180
                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp848B.tmp.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\tmp848B.tmp.exe"
                                                                                16⤵
                                                                                • Executes dropped EXE
                                                                                PID:4316
                                                                        • C:\Windows\System32\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ad95703f-1670-454d-a384-2cd66a775092.vbs"
                                                                          13⤵
                                                                            PID:3216
                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp54B1.tmp.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\tmp54B1.tmp.exe"
                                                                            13⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetThreadContext
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2112
                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp54B1.tmp.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\tmp54B1.tmp.exe"
                                                                              14⤵
                                                                              • Executes dropped EXE
                                                                              PID:3516
                                                                      • C:\Windows\System32\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4428ce8a-6574-4853-b4ef-c84ea102946a.vbs"
                                                                        11⤵
                                                                          PID:1364
                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp242B.tmp.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\tmp242B.tmp.exe"
                                                                          11⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1976
                                                                          • C:\Users\Admin\AppData\Local\Temp\tmp242B.tmp.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\tmp242B.tmp.exe"
                                                                            12⤵
                                                                            • Executes dropped EXE
                                                                            PID:3448
                                                                    • C:\Windows\System32\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\2aa7ae93-a03d-4ea7-b903-55b3ef0e8050.vbs"
                                                                      9⤵
                                                                        PID:4328
                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpF386.tmp.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\tmpF386.tmp.exe"
                                                                        9⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetThreadContext
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1964
                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpF386.tmp.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\tmpF386.tmp.exe"
                                                                          10⤵
                                                                          • Executes dropped EXE
                                                                          PID:968
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\11fe54ba-4204-4b81-a2a5-dce0c288016e.vbs"
                                                                    7⤵
                                                                      PID:2004
                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpAF1A.tmp.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\tmpAF1A.tmp.exe"
                                                                      7⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetThreadContext
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2484
                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpAF1A.tmp.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\tmpAF1A.tmp.exe"
                                                                        8⤵
                                                                        • Executes dropped EXE
                                                                        PID:4856
                                                                • C:\Windows\System32\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1106d234-e24a-48f9-a177-0265153363f1.vbs"
                                                                  5⤵
                                                                    PID:3624
                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp7C23.tmp.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\tmp7C23.tmp.exe"
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetThreadContext
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4412
                                                                    • C:\Users\Admin\AppData\Local\Temp\tmp7C23.tmp.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\tmp7C23.tmp.exe"
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      PID:5036
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Portable Devices\TextInputHost.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3376
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\TextInputHost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2836
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Portable Devices\TextInputHost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2344
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft.NET\upfc.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1816
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\upfc.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1504
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\upfc.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2148
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\dllhost.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3884
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2084
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1240
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3084
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1080
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Sidebar\Shared Gadgets\smss.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2808
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1708
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3756
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\conhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:532
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Saved Games\conhost.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1380
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\conhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4824
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Saved Games\conhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4776
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Windows\Vss\Writers\Application\spoolsv.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3884
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\Application\spoolsv.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4368
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\Vss\Writers\Application\spoolsv.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4528
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\System.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4828
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2544
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4280
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\powershell.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2880
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\powershell.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2900
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\powershell.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4492
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Users\Public\spoolsv.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4016
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Public\spoolsv.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2648
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Users\Public\spoolsv.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:688
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:4012
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2540
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3528
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\tracing\lsass.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3876
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\tracing\lsass.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:432
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Windows\tracing\lsass.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3712
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:2340
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:216
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
                                                            1⤵
                                                            • DcRat
                                                            • Process spawned unexpected child process
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:3932

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Program Files (x86)\Windows Portable Devices\TextInputHost.exe

                                                            Filesize

                                                            4.9MB

                                                            MD5

                                                            4331bb6448c6da37580f2ac382b45750

                                                            SHA1

                                                            4516ce7712311a62a03c332aec5d0dec7513efc3

                                                            SHA256

                                                            9e9ce882d8ce63520122f37c16cc256ec0365efa288f12e12cf1a25d81ad14de

                                                            SHA512

                                                            9ee79af2228dacf6294a06a069f3ef4addd897bfcd930d7c78a51062dec60ef611edcb3332f3d8181188b029dbc2635e1e35a8a2f6b8c88cb348f967da8a1b9a

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9e9ce882d8ce63520122f37c16cc256ec0365efa288f12e12cf1a25d81ad14deN.exe.log

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            bbb951a34b516b66451218a3ec3b0ae1

                                                            SHA1

                                                            7393835a2476ae655916e0a9687eeaba3ee876e9

                                                            SHA256

                                                            eb70c64ae99d14ac2588b7a84854fbf3c420532d7fe4dfd49c7b5a70c869943a

                                                            SHA512

                                                            63bcbfcf8e7421c66855c487c31b2991a989bdea0c1edd4c40066b52fa3eb3d9d37db1cd21b8eb4f33dd5870cc20532c8f485eab9c0b4f6b0793a35c077f2d6f

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            4a667f150a4d1d02f53a9f24d89d53d1

                                                            SHA1

                                                            306e125c9edce66f28fdb63e6c4ca5c9ad6e8c97

                                                            SHA256

                                                            414659decfd237dde09625a49811e03b5b30ee06ee2ee97ea8bcfac394d281fd

                                                            SHA512

                                                            4edd8e73ce03488a6d92750a782cd4042fbb54a5b3f8d8ba3ea227fda0653c2cd84f0c5d64976c7cdc1f518a2fdc8ff10e2a015ec7acf3cd01b0d62bc98542d8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            440cb38dbee06645cc8b74d51f6e5f71

                                                            SHA1

                                                            d7e61da91dc4502e9ae83281b88c1e48584edb7c

                                                            SHA256

                                                            8ef7a682dfd99ff5b7e9de0e1be43f0016d68695a43c33c028af2635cc15ecfe

                                                            SHA512

                                                            3aab19578535e6ba0f6beb5690c87d970292100704209d2dcebddcdd46c6bead27588ef5d98729bfd50606a54cc1edf608b3d15bef42c13b9982aaaf15de7fd6

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            77d622bb1a5b250869a3238b9bc1402b

                                                            SHA1

                                                            d47f4003c2554b9dfc4c16f22460b331886b191b

                                                            SHA256

                                                            f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

                                                            SHA512

                                                            d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            2e907f77659a6601fcc408274894da2e

                                                            SHA1

                                                            9f5b72abef1cd7145bf37547cdb1b9254b4efe9d

                                                            SHA256

                                                            385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233

                                                            SHA512

                                                            34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            cadef9abd087803c630df65264a6c81c

                                                            SHA1

                                                            babbf3636c347c8727c35f3eef2ee643dbcc4bd2

                                                            SHA256

                                                            cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

                                                            SHA512

                                                            7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            bd5940f08d0be56e65e5f2aaf47c538e

                                                            SHA1

                                                            d7e31b87866e5e383ab5499da64aba50f03e8443

                                                            SHA256

                                                            2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6

                                                            SHA512

                                                            c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            e448fe0d240184c6597a31d3be2ced58

                                                            SHA1

                                                            372b8d8c19246d3e38cd3ba123cc0f56070f03cd

                                                            SHA256

                                                            c660f0db85a1e7f0f68db19868979bf50bd541531babf77a701e1b1ce5e6a391

                                                            SHA512

                                                            0b7f7eae7700d32b18eee3677cb7f89b46ace717fa7e6b501d6c47d54f15dff7e12b49f5a7d36a6ffe4c16165c7d55162db4f3621db545b6af638035752beab4

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            59d97011e091004eaffb9816aa0b9abd

                                                            SHA1

                                                            1602a56b01dd4b7c577ca27d3117e4bcc1aa657b

                                                            SHA256

                                                            18f381e0db020a763b8c515c346ef58679ab9c403267eacfef5359e272f7e71d

                                                            SHA512

                                                            d9ca49c1a17580981e2c1a50d73c0eecaa7a62f8514741512172e395af2a3d80aeb0f71c58bc7f52c18246d57ba67af09b6bff4776877d6cc6f0245c30e092d6

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            65a68df1062af34622552c4f644a5708

                                                            SHA1

                                                            6f6ecf7b4b635abb0b132d95dac2759dc14b50af

                                                            SHA256

                                                            718dc2f5f4a6dbb7fab7f3db05bd7f602fb16526caae7084ab46c3ab4e7bad35

                                                            SHA512

                                                            4e460eb566032942547b58411222dd26ae300a95f83cf5ae6df58ebd28594341123611b348bd4031a33bc7f38307d5cb8fb677bba8c896919e3eee677a104d4d

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            b1a1d8b05525b7b0c5babfd80488c1f2

                                                            SHA1

                                                            c85bbd6b7d0143676916c20fd52720499c2bb5c6

                                                            SHA256

                                                            adad192fc86c2f939fd3f70cb9ad323139a4e100f7c90b4454e2c53bdbc9b705

                                                            SHA512

                                                            346c6513c1373bab58439e37d3f75de1c5c587d7eb27076cf696e885a027b3b38d70b585839d1a2e7f2270cdcf0dac8c1fdff799f3b1158242ae9e3364c2a06e

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            fdf15f7d08f3f7538ae67e5b3e5d23f4

                                                            SHA1

                                                            953ff0529053ce3a1930b4f5abba2364a8befbfc

                                                            SHA256

                                                            9f4964b9cf2c6d4915a8f2b9746dc5ff73d6f327c81370f92e0e7a611b28a707

                                                            SHA512

                                                            4fee933635376d1467e0be63d12fa897f83cbbf9cdd1ac79cce30dfaa2621d47e137e991b701f1ed9910767904dbfb6b89db2a02ce32edc410c83351f351d7ed

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            c4fee36040f3f2bd5ab8cf4ceb483d10

                                                            SHA1

                                                            7766b611607f908c4161c7a4dd8f9f1f31e7aa3b

                                                            SHA256

                                                            b9bb27c86647601607b2568ccc541c36ffa769424eb6971898f231b1d7a9bf82

                                                            SHA512

                                                            51a102819956a0bfc076a1f9287ddad1cd39fa365a8ef4ecc24ae426c5cda6969db1dd8b2362dd836976d6fc916e6283185591beac49b4b1b7f5788eae695237

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                            Filesize

                                                            944B

                                                            MD5

                                                            6bf2927575032d77fab2956579e56348

                                                            SHA1

                                                            55bfbdacbf4a787b232793f19eca4df667722621

                                                            SHA256

                                                            a8f97ad6d46dc8b95328e3d85c48451537b2c71855a5913f7b2f3305dab0b6f0

                                                            SHA512

                                                            7649c7f3c6d753ce6d374798f1f9e0bc6aa84fd445407bd0a0a4cfaa6f48c5d54deb0c836b39b5104c9e82922c0daa84fe824c43f84ae89860c7d1c68610decc

                                                          • C:\Users\Admin\AppData\Local\Temp\1106d234-e24a-48f9-a177-0265153363f1.vbs

                                                            Filesize

                                                            521B

                                                            MD5

                                                            4bb1a4ddd710fb7c076b69e9d237c72b

                                                            SHA1

                                                            df3c9bf40ed09457d23042ff3ba6f4434b286c0e

                                                            SHA256

                                                            279682f37138b8b340ccc8e1cf9ba131e22fffc8e8d67560e4929f3fddef6cfa

                                                            SHA512

                                                            62631469d4fb22adf590c60c68dea71b52c833223b8a0dd69bb751523292e212280c90de7550d6060745f423094c152a1315116dbb503ad4b2cbf8bed5794ef1

                                                          • C:\Users\Admin\AppData\Local\Temp\1f25d2f7-1cef-48e2-a7fb-772482ae30af.vbs

                                                            Filesize

                                                            745B

                                                            MD5

                                                            f4879ad028d8f46ec3ee4c2daa371c73

                                                            SHA1

                                                            5b7b9792d946ebb8fd9c069de0807fae93c75daa

                                                            SHA256

                                                            dcbaff88114919c08995ef7fcf696a1259bbcbddf6043ff4e02c19a26f7ba87d

                                                            SHA512

                                                            5707cb4f16f01e4a44ecb43de2265d9c5b3695d1d3c76b769705bc21a3dd674a0900b13665b4b9e892d322acafb019d6cc4183ced479e22148c30796c5b65613

                                                          • C:\Users\Admin\AppData\Local\Temp\68c6e7b1-3bff-4c81-b9ca-f3d2cea3074e.vbs

                                                            Filesize

                                                            745B

                                                            MD5

                                                            03124a13d0abfeb862e4f689dd69b884

                                                            SHA1

                                                            b496d3c2b9cd4d14c2b1864ab3b80226efb1b098

                                                            SHA256

                                                            13e20cafa6bc68b3045177f8a08ad231360ff6daf854228e70ffbbfb25a45698

                                                            SHA512

                                                            698050388a1a5fc31475d1d9af2f3cae9f67f1ea33f507b193a62d8216cded468ef37c9e9b5e2b4c2935275129c6c0e26bb0b9bead450c5d4cac502d819790f7

                                                          • C:\Users\Admin\AppData\Local\Temp\7dc22e41-9e88-491d-ac10-fef1841c82bb.vbs

                                                            Filesize

                                                            745B

                                                            MD5

                                                            c09bcd4f1ed2ac0af4338a02804ef0d0

                                                            SHA1

                                                            ea8a53af49132edcdc24b5d5a6602355c6ab9e66

                                                            SHA256

                                                            8dbb7e3a27548b22763d7bd014b600c8761a34a57b5bc4cf877c0ec4eee64552

                                                            SHA512

                                                            5def11c9cf7ba5d5de88c461a908a26bc3edd81e2e9d4426549057af8ae2ebcf8bf3ef64a9793dc44517765adf1227cc7d8863be7c220f3f4540873bc19df872

                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ub5w0ugn.2yy.ps1

                                                            Filesize

                                                            60B

                                                            MD5

                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                            SHA1

                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                            SHA256

                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                            SHA512

                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                          • C:\Users\Admin\AppData\Local\Temp\a044f550-3ef2-4acb-a020-7a919bc448d3.vbs

                                                            Filesize

                                                            745B

                                                            MD5

                                                            c1a045e3d72f2cd102db0b07d58148bb

                                                            SHA1

                                                            4e42b84061991c4fe44ec70d58ba0065967c182f

                                                            SHA256

                                                            478e853a92198398fc8046e7ba4b9723602c04f3b5bc8708eb37b428a8b2fead

                                                            SHA512

                                                            6aaed37b91a830c5df4a4c425bb291c8b0ef87c1e93e9eb974a3a99ab2ce1a7cbf10502594770bee4e590a18ff99e8a49f15842257c958645c9d740ac36ceb40

                                                          • C:\Users\Admin\AppData\Local\Temp\c774b6e6-4c35-4230-8e0a-61b917ae855e.vbs

                                                            Filesize

                                                            745B

                                                            MD5

                                                            f589f8f8a393ec35922c0e52c1078f36

                                                            SHA1

                                                            9982768a155bdd577c61e1eabe822a2bc025d0d1

                                                            SHA256

                                                            34f39c4d051770bf8740ace5d7a08e36c6ceb8db2333eee50ea952da05e88d81

                                                            SHA512

                                                            a30dbd3d52fa5a2ea17e2328f51feee854a927400b5eb3094fbc38f823c17e59ec2e8026aeda5d318b057d62906475fefee887ff7a0a3fc29ebea345ff99e754

                                                          • C:\Users\Admin\AppData\Local\Temp\tmp355A.tmp.exe

                                                            Filesize

                                                            75KB

                                                            MD5

                                                            e0a68b98992c1699876f818a22b5b907

                                                            SHA1

                                                            d41e8ad8ba51217eb0340f8f69629ccb474484d0

                                                            SHA256

                                                            2b00d8c2bcc6b48e90524cdd41a07735dc94548ed41925baff86e43a61a4c37f

                                                            SHA512

                                                            856854f5fd89ae1669e4b2db10b73b4a78496bf80117003244c83e781f75e533e2e2bea9aa6c1b3aba3db1ed92ea0ed9755fbfd78cd6c86ba95867d07fc0ece2

                                                          • C:\Users\Admin\AppData\Local\Temp\z3INVnGHGt.bat

                                                            Filesize

                                                            234B

                                                            MD5

                                                            d8de07ee5e8e7ea0dcdf1d89c23e3139

                                                            SHA1

                                                            db32fbc604100cfd379c6192c99415294c37458a

                                                            SHA256

                                                            d6afc606a3f9e974c4d1b81d798d7cd83a8e57b8dadbedd915519b8c240bd617

                                                            SHA512

                                                            67f798de199aedc8a9607f11ca8be48723b2694e1b639c3bc6f42d9cbcadc75329bd180718a6ff7663993c2b7844d1925ac052a61879ce028fa1b465c1e7d5c3

                                                          • memory/1884-10-0x000000001B640000-0x000000001B64A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/1884-6-0x0000000000FC0000-0x0000000000FC8000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/1884-17-0x000000001BD00000-0x000000001BD08000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/1884-16-0x000000001B690000-0x000000001B698000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/1884-13-0x000000001B660000-0x000000001B66A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/1884-14-0x000000001B670000-0x000000001B67E000-memory.dmp

                                                            Filesize

                                                            56KB

                                                          • memory/1884-15-0x000000001B680000-0x000000001B68E000-memory.dmp

                                                            Filesize

                                                            56KB

                                                          • memory/1884-12-0x000000001C230000-0x000000001C758000-memory.dmp

                                                            Filesize

                                                            5.2MB

                                                          • memory/1884-11-0x000000001B650000-0x000000001B662000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/1884-18-0x000000001BE10000-0x000000001BE1C000-memory.dmp

                                                            Filesize

                                                            48KB

                                                          • memory/1884-0-0x00007FFDB5D50000-0x00007FFDB5E50000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/1884-8-0x00000000029C0000-0x00000000029D6000-memory.dmp

                                                            Filesize

                                                            88KB

                                                          • memory/1884-9-0x000000001B630000-0x000000001B640000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/1884-173-0x00007FFDB5D50000-0x00007FFDB5E50000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/1884-7-0x00000000029B0000-0x00000000029C0000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/1884-5-0x000000001BCB0000-0x000000001BD00000-memory.dmp

                                                            Filesize

                                                            320KB

                                                          • memory/1884-4-0x0000000002980000-0x000000000299C000-memory.dmp

                                                            Filesize

                                                            112KB

                                                          • memory/1884-3-0x000000001B4C0000-0x000000001B5EE000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/1884-2-0x00007FFDB5D50000-0x00007FFDB5E50000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/1884-1-0x0000000000270000-0x0000000000764000-memory.dmp

                                                            Filesize

                                                            5.0MB

                                                          • memory/2708-601-0x000000001C130000-0x000000001C142000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/4472-67-0x0000000000400000-0x0000000000407000-memory.dmp

                                                            Filesize

                                                            28KB

                                                          • memory/4860-548-0x000000001C590000-0x000000001C5A2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/4880-675-0x00000000029B0000-0x00000000029C2000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/4884-620-0x0000000001130000-0x0000000001142000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/5048-75-0x0000021C318A0000-0x0000021C318C2000-memory.dmp

                                                            Filesize

                                                            136KB