Resubmissions

28-11-2024 02:19

241128-cr9sks1kht 10

27-11-2024 21:08

241127-zyzyaawqgn 10

27-11-2024 20:16

241127-y145caymbs 10

27-11-2024 20:13

241127-yzlxdavlen 10

27-11-2024 19:53

241127-yl61dsxpcs 10

27-11-2024 19:38

241127-ycrjcaxkfx 10

27-11-2024 19:03

241127-xqsswsslej 10

27-11-2024 19:03

241127-xqf44aslcr 3

27-11-2024 19:02

241127-xpxqfsslan 3

27-11-2024 18:32

241127-w6pkqs1mek 10

Analysis

  • max time kernel
    304s
  • max time network
    330s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-08-2024 21:47

Errors

Reason
Machine shutdown

General

  • Target

    Downloaders.zip

  • Size

    12KB

  • MD5

    94fe78dc42e3403d06477f995770733c

  • SHA1

    ea6ba4a14bab2a976d62ea7ddd4940ec90560586

  • SHA256

    16930620b3b9166e0ffbd98f5d5b580c9919fd6ccdcc74fb996f53577f508267

  • SHA512

    add85726e7d2c69068381688fe84defe820f600e6214eff029042e3002e9f4ad52dde3b8bb28f4148cca1b950cd54d3999ce9e8445c4562d1ef2efdb1c6bdeff

  • SSDEEP

    384:6BfwcSEp9ZjKXSBIDv4dDfjlMJ7HWTHWB:efACW6Dr8HWTHWB

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://91.202.233.141/

Wallets

0xCa90599132C4D88907Bd8E046540284aa468a035

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

LLeT2zkStY3cvxMBFhoWXkG5VuZPoezduv

rwc4LVd9ABpULQ1CuCpDkgX2xVB1fUijyb

4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

17hgMFyLDwMjxWqw5GhijhnPdJDyFDqecY

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1epx67ne4vckqmaj4gwke8m322f4yjr6eh52wqw

bc1qmpkehfffkr6phuklsksnd7nhgx0369sxu772m3

bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3

Attributes
  • mutex

    x88767657x

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Extracted

Family

snakekeylogger

Credentials

Extracted

Family

vidar

Version

8.8

Botnet

b1d953ef7170b7533c12ec48f4e2dfdc

C2

https://tufure.xyz

https://steamcommunity.com/profiles/76561199662282318

https://t.me/t8jmhl

Attributes
  • profile_id_v2

    b1d953ef7170b7533c12ec48f4e2dfdc

  • user_agent

    Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) AppleWebKit/534.6 (KHTML, like Gecko) Chrome/8.0.500.0 Safari/534.6

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:1604

127.0.0.1:22253

eu-central-7075.packetriot.net:6606

eu-central-7075.packetriot.net:7707

eu-central-7075.packetriot.net:8808

eu-central-7075.packetriot.net:1604

eu-central-7075.packetriot.net:22253

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

redline

C2

185.215.113.9:12617

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect Vidar Stealer 3 IoCs
  • Detect Xworm Payload 2 IoCs
  • Modifies security service 2 TTPs 3 IoCs
  • Phorphiex payload 4 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs 24 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Async RAT payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 52 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 28 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 9 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 25 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: SetClipboardViewer 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Downloaders.zip
    1⤵
      PID:4576
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3580
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /0
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:484
      • C:\Users\Admin\Desktop\malware\4363463463464363463463463.exe
        "C:\Users\Admin\Desktop\malware\4363463463464363463463463.exe"
        1⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Users\Admin\Desktop\malware\Files\twztl.exe
          "C:\Users\Admin\Desktop\malware\Files\twztl.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4968
          • C:\Windows\sysmablsvr.exe
            C:\Windows\sysmablsvr.exe
            3⤵
            • Modifies security service
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2320
            • C:\Users\Admin\AppData\Local\Temp\234627368.exe
              C:\Users\Admin\AppData\Local\Temp\234627368.exe
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5044
            • C:\Users\Admin\AppData\Local\Temp\142033020.exe
              C:\Users\Admin\AppData\Local\Temp\142033020.exe
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3280
              • C:\Windows\sysmysldrv.exe
                C:\Windows\sysmysldrv.exe
                5⤵
                • Modifies security service
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: SetClipboardViewer
                • Suspicious use of WriteProcessMemory
                PID:2068
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1172
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                    7⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4032
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2788
                  • C:\Windows\SysWOW64\sc.exe
                    sc stop UsoSvc
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:1296
                  • C:\Windows\SysWOW64\sc.exe
                    sc stop WaaSMedicSvc
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:1892
                  • C:\Windows\SysWOW64\sc.exe
                    sc stop wuauserv
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:652
                  • C:\Windows\SysWOW64\sc.exe
                    sc stop DoSvc
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:3756
                  • C:\Windows\SysWOW64\sc.exe
                    sc stop BITS
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:3484
                • C:\Users\Admin\AppData\Local\Temp\130710817.exe
                  C:\Users\Admin\AppData\Local\Temp\130710817.exe
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4864
                • C:\Users\Admin\AppData\Local\Temp\187302694.exe
                  C:\Users\Admin\AppData\Local\Temp\187302694.exe
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1356
        • C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe
          "C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:772
          • C:\Windows\SysWOW64\ftp.exe
            C:\Windows\SysWOW64\ftp.exe
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: MapViewOfSection
            PID:640
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2628
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 1768
                5⤵
                • Program crash
                PID:5076
        • C:\Users\Admin\Desktop\malware\Files\m.exe
          "C:\Users\Admin\Desktop\malware\Files\m.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3856
        • C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe
          "C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"
          2⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2112
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf HR" /sc HOURLY /rl HIGHEST
            3⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:72
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf LG" /sc ONLOGON /rl HIGHEST
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3344
          • C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe
            "C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1384
            • C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe
              "C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:688
        • C:\Users\Admin\Desktop\malware\Files\tdrpload.exe
          "C:\Users\Admin\Desktop\malware\Files\tdrpload.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4856
        • C:\Users\Admin\Desktop\malware\Files\1.exe
          "C:\Users\Admin\Desktop\malware\Files\1.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:872
          • C:\Windows\sysarddrvs.exe
            C:\Windows\sysarddrvs.exe
            3⤵
            • Modifies security service
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: SetClipboardViewer
            PID:3428
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2040
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:4444
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4928
              • C:\Windows\SysWOW64\sc.exe
                sc stop UsoSvc
                5⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:1916
              • C:\Windows\SysWOW64\sc.exe
                sc stop WaaSMedicSvc
                5⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:1296
              • C:\Windows\SysWOW64\sc.exe
                sc stop wuauserv
                5⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:2232
              • C:\Windows\SysWOW64\sc.exe
                sc stop DoSvc
                5⤵
                • Launches sc.exe
                PID:1796
              • C:\Windows\SysWOW64\sc.exe
                sc stop BITS
                5⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:4300
            • C:\Users\Admin\AppData\Local\Temp\30165541.exe
              C:\Users\Admin\AppData\Local\Temp\30165541.exe
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1628
            • C:\Users\Admin\AppData\Local\Temp\2037629779.exe
              C:\Users\Admin\AppData\Local\Temp\2037629779.exe
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3932
        • C:\Users\Admin\Desktop\malware\Files\pi.exe
          "C:\Users\Admin\Desktop\malware\Files\pi.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2636
          • C:\Windows\sylsplvc.exe
            C:\Windows\sylsplvc.exe
            3⤵
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: SetClipboardViewer
            PID:3344
            • C:\Users\Admin\AppData\Local\Temp\756722409.exe
              C:\Users\Admin\AppData\Local\Temp\756722409.exe
              4⤵
                PID:872
              • C:\Users\Admin\AppData\Local\Temp\1127213725.exe
                C:\Users\Admin\AppData\Local\Temp\1127213725.exe
                4⤵
                  PID:5336
            • C:\Users\Admin\Desktop\malware\Files\1111.exe
              "C:\Users\Admin\Desktop\malware\Files\1111.exe"
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2840
            • C:\Users\Admin\Desktop\malware\Files\nxmr.exe
              "C:\Users\Admin\Desktop\malware\Files\nxmr.exe"
              2⤵
              • Executes dropped EXE
              PID:4208
            • C:\Users\Admin\Desktop\malware\Files\Destover.exe
              "C:\Users\Admin\Desktop\malware\Files\Destover.exe"
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4232
          • C:\Users\Admin\Desktop\malware\New Text Document mod.exe
            "C:\Users\Admin\Desktop\malware\New Text Document mod.exe"
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4536
            • C:\Users\Admin\Desktop\malware\a\robotic.exe
              "C:\Users\Admin\Desktop\malware\a\robotic.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3596
            • C:\Users\Admin\Desktop\malware\a\asusns.exe
              "C:\Users\Admin\Desktop\malware\a\asusns.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:5072
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OKmzKrla.exe"
                3⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:3752
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OKmzKrla" /XML "C:\Users\Admin\AppData\Local\Temp\tmp489E.tmp"
                3⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:3476
              • C:\Users\Admin\Desktop\malware\a\asusns.exe
                "C:\Users\Admin\Desktop\malware\a\asusns.exe"
                3⤵
                • Executes dropped EXE
                • Accesses Microsoft Outlook profiles
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • outlook_office_path
                • outlook_win_path
                PID:4528
            • C:\Users\Admin\Desktop\malware\a\msedge.exe
              "C:\Users\Admin\Desktop\malware\a\msedge.exe"
              2⤵
              • Drops startup file
              • Executes dropped EXE
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2468
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\malware\a\msedge.exe'
                3⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of AdjustPrivilegeToken
                PID:1204
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'
                3⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of AdjustPrivilegeToken
                PID:5024
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\msedge.exe'
                3⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of AdjustPrivilegeToken
                PID:1172
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'
                3⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of AdjustPrivilegeToken
                PID:1556
              • C:\Windows\System32\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\ProgramData\msedge.exe"
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:4072
            • C:\Users\Admin\Desktop\malware\a\stub.exe
              "C:\Users\Admin\Desktop\malware\a\stub.exe"
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1096
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4960
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:3360
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp82B9.tmp.bat""
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1404
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 3
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Delays execution with timeout.exe
                  PID:3556
                • C:\Users\Admin\AppData\Roaming\svchost.exe
                  "C:\Users\Admin\AppData\Roaming\svchost.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2964
            • C:\Users\Admin\Desktop\malware\a\build2.exe
              "C:\Users\Admin\Desktop\malware\a\build2.exe"
              2⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1728
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 772
                3⤵
                • Program crash
                PID:4912
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 820
                3⤵
                • Program crash
                PID:1504
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 836
                3⤵
                • Program crash
                PID:2756
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 944
                3⤵
                • Program crash
                PID:948
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 948
                3⤵
                • Program crash
                PID:1792
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 948
                3⤵
                • Program crash
                PID:4456
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 1040
                3⤵
                • Program crash
                PID:1644
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 1036
                3⤵
                • Program crash
                PID:1908
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 1188
                3⤵
                • Program crash
                PID:1732
              • C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe
                "C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:892
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 584
                  4⤵
                  • Program crash
                  PID:4456
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 620
                  4⤵
                  • Program crash
                  PID:4196
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 688
                  4⤵
                  • Program crash
                  PID:3584
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 796
                  4⤵
                  • Program crash
                  PID:568
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 892
                  4⤵
                  • Program crash
                  PID:1800
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 936
                  4⤵
                  • Program crash
                  PID:5052
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 956
                  4⤵
                  • Program crash
                  PID:912
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 964
                  4⤵
                  • Program crash
                  PID:2016
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 956
                  4⤵
                  • Program crash
                  PID:2040
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 1088
                  4⤵
                  • Program crash
                  PID:2476
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 1156
                  4⤵
                  • Program crash
                  PID:4308
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 1364
                  4⤵
                  • Program crash
                  PID:4720
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 1436
                  4⤵
                  • Program crash
                  PID:3588
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 828
                3⤵
                • Program crash
                PID:1916
            • C:\Users\Admin\Desktop\malware\a\l2.exe
              "C:\Users\Admin\Desktop\malware\a\l2.exe"
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:132
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
                3⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1768
            • C:\Users\Admin\Desktop\malware\a\keylogger.exe
              "C:\Users\Admin\Desktop\malware\a\keylogger.exe"
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3556
            • C:\Users\Admin\Desktop\malware\a\networks_profile.exe
              "C:\Users\Admin\Desktop\malware\a\networks_profile.exe"
              2⤵
              • Executes dropped EXE
              PID:4928
              • C:\Users\Admin\Desktop\malware\a\networks_profile.exe
                "C:\Users\Admin\Desktop\malware\a\networks_profile.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1068
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "ver"
                  4⤵
                    PID:2040
                  • C:\Windows\SYSTEM32\netsh.exe
                    netsh wlan show profiles
                    4⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Network Configuration Discovery: Wi-Fi Discovery
                    PID:72
              • C:\Users\Admin\Desktop\malware\a\backdoor.exe
                "C:\Users\Admin\Desktop\malware\a\backdoor.exe"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2016
              • C:\Users\Admin\Desktop\malware\a\wahost.exe
                "C:\Users\Admin\Desktop\malware\a\wahost.exe"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:684
                • C:\Users\Admin\Desktop\malware\a\wahost.exe
                  "C:\Users\Admin\Desktop\malware\a\wahost.exe"
                  3⤵
                    PID:772
                • C:\Users\Admin\Desktop\malware\a\regasm.exe
                  "C:\Users\Admin\Desktop\malware\a\regasm.exe"
                  2⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2084
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eVoVlc.exe"
                    3⤵
                    • Command and Scripting Interpreter: PowerShell
                    PID:1924
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eVoVlc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp748B.tmp"
                    3⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:1812
                  • C:\Users\Admin\Desktop\malware\a\regasm.exe
                    "C:\Users\Admin\Desktop\malware\a\regasm.exe"
                    3⤵
                      PID:940
                    • C:\Users\Admin\Desktop\malware\a\regasm.exe
                      "C:\Users\Admin\Desktop\malware\a\regasm.exe"
                      3⤵
                        PID:1312
                      • C:\Users\Admin\Desktop\malware\a\regasm.exe
                        "C:\Users\Admin\Desktop\malware\a\regasm.exe"
                        3⤵
                          PID:2716
                      • C:\Users\Admin\Desktop\malware\a\cookie250.exe
                        "C:\Users\Admin\Desktop\malware\a\cookie250.exe"
                        2⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Modifies system certificate store
                        PID:1868
                      • C:\Users\Admin\Desktop\malware\a\sahost.exe
                        "C:\Users\Admin\Desktop\malware\a\sahost.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:1768
                    • C:\Users\Admin\Desktop\malware\Files\twztl.exe
                      "C:\Users\Admin\Desktop\malware\Files\twztl.exe"
                      1⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:3396
                    • C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe
                      "C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe"
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of WriteProcessMemory
                      PID:4980
                      • C:\Windows\SysWOW64\ftp.exe
                        C:\Windows\SysWOW64\ftp.exe
                        2⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: MapViewOfSection
                        PID:3640
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1560
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 1916
                            4⤵
                            • Program crash
                            PID:2204
                    • C:\Users\Admin\Desktop\malware\Files\m.exe
                      "C:\Users\Admin\Desktop\malware\Files\m.exe"
                      1⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2180
                    • C:\Users\Admin\Desktop\malware\Files\twztl.exe
                      "C:\Users\Admin\Desktop\malware\Files\twztl.exe"
                      1⤵
                      • Executes dropped EXE
                      PID:2596
                    • C:\Users\Admin\Desktop\malware\Files\twztl.exe
                      "C:\Users\Admin\Desktop\malware\Files\twztl.exe"
                      1⤵
                      • Executes dropped EXE
                      PID:4312
                    • C:\Users\Admin\Desktop\malware\Files\m.exe
                      "C:\Users\Admin\Desktop\malware\Files\m.exe"
                      1⤵
                      • Executes dropped EXE
                      PID:1668
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1560 -ip 1560
                      1⤵
                        PID:5012
                      • C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe
                        "C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe"
                        1⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3244
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2628 -ip 2628
                        1⤵
                          PID:728
                        • C:\Users\Admin\Desktop\malware\Files\twztl.exe
                          "C:\Users\Admin\Desktop\malware\Files\twztl.exe"
                          1⤵
                          • Executes dropped EXE
                          PID:2632
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1728 -ip 1728
                          1⤵
                            PID:4244
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1728 -ip 1728
                            1⤵
                              PID:2860
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1728 -ip 1728
                              1⤵
                                PID:2840
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1728 -ip 1728
                                1⤵
                                  PID:2100
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1728 -ip 1728
                                  1⤵
                                    PID:3780
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1728 -ip 1728
                                    1⤵
                                      PID:1628
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1728 -ip 1728
                                      1⤵
                                        PID:4720
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1728 -ip 1728
                                        1⤵
                                          PID:1332
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1728 -ip 1728
                                          1⤵
                                            PID:3476
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1728 -ip 1728
                                            1⤵
                                              PID:988
                                            • C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe
                                              "C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"
                                              1⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3876
                                              • C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe
                                                "C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:1776
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 892 -ip 892
                                              1⤵
                                                PID:1924
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 892 -ip 892
                                                1⤵
                                                  PID:3588
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 892 -ip 892
                                                  1⤵
                                                    PID:1384
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 892 -ip 892
                                                    1⤵
                                                      PID:1668
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 892 -ip 892
                                                      1⤵
                                                        PID:1796
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 892 -ip 892
                                                        1⤵
                                                          PID:4240
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 892 -ip 892
                                                          1⤵
                                                            PID:2632
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 892 -ip 892
                                                            1⤵
                                                              PID:1812
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 892 -ip 892
                                                              1⤵
                                                                PID:3436
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 892 -ip 892
                                                                1⤵
                                                                  PID:72
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 892 -ip 892
                                                                  1⤵
                                                                    PID:2340
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 892 -ip 892
                                                                    1⤵
                                                                      PID:1340
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 892 -ip 892
                                                                      1⤵
                                                                        PID:4208
                                                                      • C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:3432
                                                                      • C:\ProgramData\msedge.exe
                                                                        C:\ProgramData\msedge.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1812
                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
                                                                        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2012
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
                                                                          2⤵
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:3608
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#llzqlmcx#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Windows Upgrade Manager' /tr '''C:\Users\Admin\Windows Upgrade\wupgrdsv.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Windows Upgrade\wupgrdsv.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Windows Upgrade Manager' -RunLevel 'Highest' -Force; }
                                                                        1⤵
                                                                        • Command and Scripting Interpreter: PowerShell
                                                                        PID:4236
                                                                      • C:\Windows\System32\schtasks.exe
                                                                        C:\Windows\System32\schtasks.exe /run /tn "Windows Upgrade Manager"
                                                                        1⤵
                                                                          PID:2716
                                                                        • C:\Users\Admin\Windows Upgrade\wupgrdsv.exe
                                                                          "C:\Users\Admin\Windows Upgrade\wupgrdsv.exe"
                                                                          1⤵
                                                                            PID:4240
                                                                          • C:\Users\Admin\Desktop\malware\Files\nxmr.exe
                                                                            "C:\Users\Admin\Desktop\malware\Files\nxmr.exe"
                                                                            1⤵
                                                                              PID:4912

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              0a6392a9418523a6cbf0f127696bc749

                                                                              SHA1

                                                                              7d89a23b1b87acd054a4835c34e6df47cbf5d45f

                                                                              SHA256

                                                                              a5aa402997f196453aa7d18e02a2ccd3024a0b286df355743f5c0f1d506a0542

                                                                              SHA512

                                                                              305b344a2bff46a67322473384866d87c5b58f3f9de3ffb07d416c2ff573e557b4945d2b6c18a738f1206c1c6f8238ff1b148f4ff18a9c2b12b7bbe94b819d47

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4EA478292998338A09FD0BC7EF51AE41_A87B24898C77B951495C6F6D7597659C

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              5a4588619e6ac64cd4c2f2a73ed071d5

                                                                              SHA1

                                                                              1d9f2eff48c6170c449be563442792f882594488

                                                                              SHA256

                                                                              4376dfd7519b2ef9197c6aa62b4c88a9fd7d376d702b720c775d436cb5302ebc

                                                                              SHA512

                                                                              353dadd27bf277960d6c018a38525e8bf7299d58b628959e7f810f0caf7a0df963c267591c00ed05a65f5624f8e8d9a306291b221c06e2c2dece78282c0520a5

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                                                                              Filesize

                                                                              450B

                                                                              MD5

                                                                              40ff521c2df698c72076683258639573

                                                                              SHA1

                                                                              d977cdc19350ff1a0e31c3897cd153f24996f915

                                                                              SHA256

                                                                              7c680529ed8584799e8a3c0440717ee42a951a573330d92350060a28e9cf9300

                                                                              SHA512

                                                                              21d02f29d5a72cbb3560efd2f57998258c59f8ca399b334573d7dc5df268df93f46d6bd95938f8fb318981448df1f5b4029edbbbeeaf51ee1f564ac2a23d7028

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4EA478292998338A09FD0BC7EF51AE41_A87B24898C77B951495C6F6D7597659C

                                                                              Filesize

                                                                              458B

                                                                              MD5

                                                                              534596cfc0e1e5f4427979ebc8b60285

                                                                              SHA1

                                                                              12a8bf61b38c910b64ad97843239c325a87006d1

                                                                              SHA256

                                                                              9752337de93e7c1bfd7bfe96924a9457c728af9543ac6dc395b889b1aea1739d

                                                                              SHA512

                                                                              9fef17de4bd7991df7821c06255742c16564bc3d3611bdcf96549120bd21936a84428baf9608c51516528e6564ea093da79f61c16d2ea229368336ed74263758

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              627073ee3ca9676911bee35548eff2b8

                                                                              SHA1

                                                                              4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                              SHA256

                                                                              85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                              SHA512

                                                                              3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\asusns.exe.log

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              7e1ed0055c3eaa0bbc4a29ec1ef15a6a

                                                                              SHA1

                                                                              765b954c1adbb6a6ecc4fe912fdaa6d0fba0ae7d

                                                                              SHA256

                                                                              4c17576f64dea465c45a50573ee41771f7be9962ab2d07f961af4df5589bdcce

                                                                              SHA512

                                                                              de7c784c37d18c43820908add88f08ab4864c0ef3f9d158cc2c9d1bab120613cb093dd4bfc5d7ed0c289414956cfe0b213c386f8e6b5753847dec915566297c8

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              d0c46cad6c0778401e21910bd6b56b70

                                                                              SHA1

                                                                              7be418951ea96326aca445b8dfe449b2bfa0dca6

                                                                              SHA256

                                                                              9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

                                                                              SHA512

                                                                              057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M3DUQV5R\RYBW2NU4.htm

                                                                              Filesize

                                                                              114B

                                                                              MD5

                                                                              e89f75f918dbdcee28604d4e09dd71d7

                                                                              SHA1

                                                                              f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

                                                                              SHA256

                                                                              6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

                                                                              SHA512

                                                                              8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                              Filesize

                                                                              18KB

                                                                              MD5

                                                                              8deb121d3b7098fa1080dd766a818fd4

                                                                              SHA1

                                                                              02979e1c1981c66d1494d6577623c30228996e15

                                                                              SHA256

                                                                              3c0a69b9d4ae8b49c1c62c756072af3cda8791328d512763afa94e321ec1c1f0

                                                                              SHA512

                                                                              82240d216310313bfbb0c23b38c48bc50d65a5c64dc4eee6d5ec693eedb53d5ac2b538b0a5a8508980933626d972b5a0e9998508b8bc3190750f0f2a864e2271

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                              Filesize

                                                                              18KB

                                                                              MD5

                                                                              0d0d2452872d607c951024defada807b

                                                                              SHA1

                                                                              044d5d6fdb7129d7f46fc9316db11bbc1c06ed1d

                                                                              SHA256

                                                                              42c5a50b9a487ecb2c3471f873a58adeb7b6b582ae5205b8911015fad59aba9c

                                                                              SHA512

                                                                              4f1160a36469ac2932ae5615894a74a1ec298146b0ad2d9868dace2619de686eee07dee32469c4e99f34e0b7a5fd63ff901e7bf34282ac4ee9233a814e6518cd

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                              Filesize

                                                                              944B

                                                                              MD5

                                                                              6344564097353c8e7e68991fffa80d88

                                                                              SHA1

                                                                              2ac4d108a30ec3fbd2938b0563eb912415ea7c62

                                                                              SHA256

                                                                              d0af6d69f8bc0c98e9fb61dead6327bbc8b4f5292529313515382d8f883de0da

                                                                              SHA512

                                                                              e2b37a9001a91cb05483d72f88bd70a61ca5655939c2290fd1580710eec9d8d26a5fedbcb5223f5413b5dcc46f1d8b6b408e57be0e4ad4b37b55cbce9023a303

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                              Filesize

                                                                              944B

                                                                              MD5

                                                                              781da0576417bf414dc558e5a315e2be

                                                                              SHA1

                                                                              215451c1e370be595f1c389f587efeaa93108b4c

                                                                              SHA256

                                                                              41a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe

                                                                              SHA512

                                                                              24e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                              Filesize

                                                                              944B

                                                                              MD5

                                                                              1d2f377a683be7cb687c9bd016093a19

                                                                              SHA1

                                                                              9df0e7f30e6959d580d73cf3eabbb4db8d018027

                                                                              SHA256

                                                                              263b8b3d6e58149e2976dafa19a5c3b0b414574f372173fb6d239819616698c7

                                                                              SHA512

                                                                              a4b4d6717e82d4e1c9d2ec478901c867c329ece3b69e64b22bba1e68a49cc05b8470dce9235def25a127781525a970d5076bf13198b43109ec27f9fa3f2070d3

                                                                            • C:\Users\Admin\AppData\Local\Temp\113fa9f2

                                                                              Filesize

                                                                              5.8MB

                                                                              MD5

                                                                              6321268230dbba37143ec80139348e3f

                                                                              SHA1

                                                                              9487fdb3231e1a932bc1ea5a84adbdc6ad7bca44

                                                                              SHA256

                                                                              13a119fa2216d25d8255efb07451e42d55c4a581f48cd69ed6b81f366f0f0dd2

                                                                              SHA512

                                                                              c2842982cad2219db36d3eabb7c9fb7aeae94ae8e06a70ba595eb842e4526a570baee512e3e88478d8dd9149ada9c10860378cdb8b0e761b77f60cea8b319bde

                                                                            • C:\Users\Admin\AppData\Local\Temp\142033020.exe

                                                                              Filesize

                                                                              92KB

                                                                              MD5

                                                                              be9388b42333b3d4e163b0ace699897b

                                                                              SHA1

                                                                              4e1109772eb9cb59c557380822166fe1664403bd

                                                                              SHA256

                                                                              d281e0a0f1e1073f2d290a7eb1f77bed4c210dbf83a0f4f4e22073f50faa843f

                                                                              SHA512

                                                                              5f887f1060b898c9a88745cde7cf509fdf42947ab8e5948b46c2df659468dc245b24d089bdbec0b314c40b83934698bf4b6feb8954e32810ff8f522aab0af19a

                                                                            • C:\Users\Admin\AppData\Local\Temp\144e6c86

                                                                              Filesize

                                                                              5.9MB

                                                                              MD5

                                                                              5a28832bdad887ae963e72518b23b678

                                                                              SHA1

                                                                              0ec0f0bf17a0a34569628c1a14a1a77908fc8257

                                                                              SHA256

                                                                              ae567fffdea29f87daed751ec9871fe1641edef7cf538f8082512e6e224b9706

                                                                              SHA512

                                                                              f1c9007c1c04ec2d4b0803365f63cb178fa7bd70515ac51540794e65843ebef61d5a3d5a38c2bc80724b7c7f2af718457a97dee1297b60f379a3cdbc90b61377

                                                                            • C:\Users\Admin\AppData\Local\Temp\187302694.exe

                                                                              Filesize

                                                                              92KB

                                                                              MD5

                                                                              e57f9e2fc24a1ace0267a7962c9e465e

                                                                              SHA1

                                                                              840f5f4aed29f241642dab534e14f86c7cd5dfc6

                                                                              SHA256

                                                                              aa66df748ef74df48c7d1c2954c49702b15e95787b1d3b562dba50894abc0910

                                                                              SHA512

                                                                              d62dde392715a6c6869d621d87f3df2713293190676b24fdbac5b40dea07530edd8770f3b7ba69f6f2fda4c5275a8a05b5f4e91b90a4feb9537ec051193040c0

                                                                            • C:\Users\Admin\AppData\Local\Temp\234627368.exe

                                                                              Filesize

                                                                              7KB

                                                                              MD5

                                                                              cf14448f02d12e7bb6a449658848b16f

                                                                              SHA1

                                                                              6b626e9a288dd5844788bff075806f05bf653a18

                                                                              SHA256

                                                                              32cac3b9230d88f0fdcae005ea8f92236a5dd2488df7ca9c97ef66f145ca4e37

                                                                              SHA512

                                                                              3fb30aebe173d881c432550d7d4085536afbb7961be4c6ceef91e3386d3b81c5312eb5c4b97bbb6d6323842ada8a562d0da262b2bf6e053a1ba569028b65e22f

                                                                            • C:\Users\Admin\AppData\Local\Temp\735401866380

                                                                              Filesize

                                                                              103KB

                                                                              MD5

                                                                              8bc26ed5eaedbd34b74d7b91b64456d3

                                                                              SHA1

                                                                              486d3d999ec8066b0a3e71c97e77672ac4cf7b17

                                                                              SHA256

                                                                              f0ec808a96ddd7ed3f07ca78d1cd27f7612dd8374b345a0db1b06d78eb6de8b8

                                                                              SHA512

                                                                              53f2a0ac134feeead095277822f4671f825b621093515910b78c83d3cf7694bc3c664a0434fbfc6c95c40db0849f8edb09fdef20b840b96fab7f726690343089

                                                                            • C:\Users\Admin\AppData\Local\Temp\Tmp3D5E.tmp

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              1420d30f964eac2c85b2ccfe968eebce

                                                                              SHA1

                                                                              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                              SHA256

                                                                              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                              SHA512

                                                                              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0hl0qtgi.2wb.ps1

                                                                              Filesize

                                                                              60B

                                                                              MD5

                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                              SHA1

                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                              SHA256

                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                              SHA512

                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                            • C:\Users\Admin\AppData\Local\Temp\nsp625D.tmp\LangDLL.dll

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              68b287f4067ba013e34a1339afdb1ea8

                                                                              SHA1

                                                                              45ad585b3cc8e5a6af7b68f5d8269c97992130b3

                                                                              SHA256

                                                                              18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026

                                                                              SHA512

                                                                              06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

                                                                            • C:\Users\Admin\AppData\Local\Temp\nsp625D.tmp\System.dll

                                                                              Filesize

                                                                              12KB

                                                                              MD5

                                                                              cff85c549d536f651d4fb8387f1976f2

                                                                              SHA1

                                                                              d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                                                                              SHA256

                                                                              8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                                                                              SHA512

                                                                              531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp489E.tmp

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              97ac03e8b13b9e72aa0b06d80a659089

                                                                              SHA1

                                                                              903eee343d1734a70058b729e907ee5aee65f0fa

                                                                              SHA256

                                                                              ca5edefc8a5a51520b171ef67b59af7dd6761ea3759654733774aace2dcb6426

                                                                              SHA512

                                                                              abfda973f436812fb5be649a95d7ff686ea95633f7e73f1e2d71e8529047654dd598f2f37028b4098ddc9c4580a4c51861d42bfcd8442436a9b07f57ce7bf53d

                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp82B9.tmp.bat

                                                                              Filesize

                                                                              151B

                                                                              MD5

                                                                              9613977075b178d91a82c478a60bf655

                                                                              SHA1

                                                                              a8249552e597a9b15c46112c779fdd16d8736d08

                                                                              SHA256

                                                                              b993f64d538698b588beced7aeabb29733dc8e64283a594db8bbabdbffbda3ad

                                                                              SHA512

                                                                              b1d624a53dea8b6a4d8a899e1feec0f65500e194f8ddc658272d10f9d1417720bfd150b295b2a19e808d7b0efd8d0bae80dcda6f621def03afc1eae0281b3137

                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNNT.lnk

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              cfb6654ed91e41cc37c6a2fde553b51f

                                                                              SHA1

                                                                              61ea499fb0a8802ec7b8e302c82c88113c9240c9

                                                                              SHA256

                                                                              53873f766b8d97f9c61eecdb8dc7f4b2ae74e012462683f509efd51912b44eb3

                                                                              SHA512

                                                                              08285c582967e75f013b1650e8d9083052a0ceded2694f684d16350529dabb9ea5bd1db7288fd83602076bcb18fb7575f64922369c9ea7374f23981388d73c07

                                                                            • C:\Users\Admin\Desktop\malware\4363463463464363463463463.zip

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              202786d1d9b71c375e6f940e6dd4828a

                                                                              SHA1

                                                                              7cad95faa33e92aceee3bcc809cd687bda650d74

                                                                              SHA256

                                                                              45930e1ff487557dd242214c1e7d07294dbedfa7bc2cf712fae46d8d6b61de76

                                                                              SHA512

                                                                              de81012a38c1933a82cb39f1ac5261e7af8df80c8478ed540111fe84a6f150f0595889b0e087889894187559f61e1142d7e4971d05bceb737ed06f13726e7eae

                                                                            • C:\Users\Admin\Desktop\malware\Files\1.exe

                                                                              Filesize

                                                                              79KB

                                                                              MD5

                                                                              e2e3268f813a0c5128ff8347cbaa58c8

                                                                              SHA1

                                                                              4952cbfbdec300c048808d79ee431972b8a7ba84

                                                                              SHA256

                                                                              d8b83f78ed905a7948e2e1e371f0f905bcaaabbb314c692fee408a454f8338a3

                                                                              SHA512

                                                                              cb5aeda8378a9a5470f33f2b70c22e77d2df97b162ba953eb16da085b3c434be31a5997eac11501db0cb612cdb30fa9045719fcd10c7227c56cc782558e0c3bc

                                                                            • C:\Users\Admin\Desktop\malware\Files\1111.exe

                                                                              Filesize

                                                                              2.8MB

                                                                              MD5

                                                                              2055eb0fa5dfccef0c68146527b0c4f4

                                                                              SHA1

                                                                              9a04941b835e1f13d96a3b4fcd137038689105a3

                                                                              SHA256

                                                                              da96b85bb04c797fd30df884ec895f8a03c7dc98c9e188733a4ee1d8754fec70

                                                                              SHA512

                                                                              8aa28d3febc2c2aeeed19f75cb871ef5f5e5e105108b7f210c54dcf9c9aafb193a9287be99bacea3e713807a89fd9c8f637b45c849e2336e6397844187a643e4

                                                                            • C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe

                                                                              Filesize

                                                                              6.0MB

                                                                              MD5

                                                                              a14e062d5ddb947dd490cd3956c7de8a

                                                                              SHA1

                                                                              1a55234d22f14e88d27cfdcd9512abf1a02d1e61

                                                                              SHA256

                                                                              6ccb73967f66acd2af71b4d41a7b5f3755f04d1adba41bafc573f8c1cc14c26a

                                                                              SHA512

                                                                              da887bfbf53f8a2945d740114d111602292923fd884cac3157d77d74a03c31891bbd167271ed4f71c77bbac133b42f2dc3414447e3aa200d9f0427d1ceebb0e8

                                                                            • C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe

                                                                              Filesize

                                                                              6.5MB

                                                                              MD5

                                                                              f2908c73543719738bea99c02fdafe00

                                                                              SHA1

                                                                              2fc8790129fa21cb76642cbd7ab04fc1783e911b

                                                                              SHA256

                                                                              be9862ad765af7e71a322549640747a6952c4e8bc18b6568c4781df33f0bbfd6

                                                                              SHA512

                                                                              fa9d5987ef0f9f14d98d5070e09d980e944e4f06966b2601a3b01bfe95a0df239305bd4dad292a8808e6dee6e02d0d33079eda2ddb668ba31d2a9949173a2a31

                                                                            • C:\Users\Admin\Desktop\malware\Files\Destover.exe

                                                                              Filesize

                                                                              89KB

                                                                              MD5

                                                                              e904bf93403c0fb08b9683a9e858c73e

                                                                              SHA1

                                                                              8397c1e1f0b9d53a114850f6b3ae8c1f2b2d1590

                                                                              SHA256

                                                                              4c2efe2f1253b94f16a1cab032f36c7883e4f6c8d9fc17d0ee553b5afb16330c

                                                                              SHA512

                                                                              d83f63737f7fcac9179ca262aa5c32bba7e140897736b63474afcf4f972ffb4c317c5e1d6f7ebe6a0f2d77db8f41204031314d7749c7185ec3e3b5286d77c1a3

                                                                            • C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe

                                                                              Filesize

                                                                              3.2MB

                                                                              MD5

                                                                              d4e494aac738b34231cb341acb16b961

                                                                              SHA1

                                                                              4cdaf5333250193c1e8939c807728a804e9dd4ad

                                                                              SHA256

                                                                              eda401786b61b9b555596c6f88f1ea858c8946491b6a37688d6c7c859cb3a04a

                                                                              SHA512

                                                                              b490cd7dd1e1861ab723856417a9c60fb379e5adc0acbe9aceffa0cd6f4cb79493522282a1e799071bd53372fc22cadfec1bacfcba0eeda6b8392177c3cd0f8e

                                                                            • C:\Users\Admin\Desktop\malware\Files\nxmr.exe

                                                                              Filesize

                                                                              5.4MB

                                                                              MD5

                                                                              41ab08c1955fce44bfd0c76a64d1945a

                                                                              SHA1

                                                                              2b9cb05f4de5d98c541d15175d7f0199cbdd0eea

                                                                              SHA256

                                                                              dd12cb27b3867341bf6ca48715756500d3ec56c19b21bb1c1290806aa74cb493

                                                                              SHA512

                                                                              38834ae703a8541b4fec9a1db94cfe296ead58649bb1d4873b517df14d0c6a9d25e49ff04c2bf6bb0188845116a4e894aae930d849f9be8c98d2ce51da1ef116

                                                                            • C:\Users\Admin\Desktop\malware\Files\pi.exe

                                                                              Filesize

                                                                              79KB

                                                                              MD5

                                                                              1e8a2ed2e3f35620fb6b8c2a782a57f3

                                                                              SHA1

                                                                              e924ce6d147ecc8b30b7c7cad02e5c9ae09a743a

                                                                              SHA256

                                                                              3f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879

                                                                              SHA512

                                                                              ce4dc7fdd7f81a7a127d650f9175292b287b4803d815d74b64a4e5125cff66224d75e7ecade1d9c0e42f870bdb49a78e9613b1a49675ab5bc098611b99b49ade

                                                                            • C:\Users\Admin\Desktop\malware\Files\twztl.exe

                                                                              Filesize

                                                                              88KB

                                                                              MD5

                                                                              ababca6d12d96e8dd2f1d7114b406fae

                                                                              SHA1

                                                                              dcd9798e83ec688aacb3de8911492a232cb41a32

                                                                              SHA256

                                                                              a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba

                                                                              SHA512

                                                                              b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f

                                                                            • C:\Users\Admin\Desktop\malware\New Text Document mod.exse.zip

                                                                              Filesize

                                                                              7KB

                                                                              MD5

                                                                              a7b1b22096cf2b8b9a0156216871768a

                                                                              SHA1

                                                                              48acafe87df586a0434459b068d9323d20f904cb

                                                                              SHA256

                                                                              82fbb67bf03714661b75a49245c8fe42141e7b68dda3f97f765eb1f2e00a89a9

                                                                              SHA512

                                                                              35b3c89b18135e3aca482b376f5013557db636a332a18c4b43d34d3983e5d070a926c95e40966fafea1d54569b9e3c4ab483eaca81b015724d42db24b5f3805f

                                                                            • C:\Users\Admin\Desktop\malware\a\asusns.exe

                                                                              Filesize

                                                                              701KB

                                                                              MD5

                                                                              0e3ed8b5e5952cffc0e119b6082a6599

                                                                              SHA1

                                                                              b8275da931abd327fb0ad3b102a5917aa950c636

                                                                              SHA256

                                                                              e5797ef4bea22b1d24a9147c48726e9960ffa1b5866e04c11de117531483fe9d

                                                                              SHA512

                                                                              15e06c4a477984dac67d7301d8019935af32e7a5fc47c6d69533f00e7aa3992cd8e496d02f05f9c2f4c43f3a928fe070276bdcb18f86bcab43faae3709522beb

                                                                            • C:\Users\Admin\Desktop\malware\a\backdoor.exe

                                                                              Filesize

                                                                              68KB

                                                                              MD5

                                                                              698f5896ec35c84909344dc08b7cae67

                                                                              SHA1

                                                                              4c3eb447125f74f2eef63e14a5d97a823fa8d4e9

                                                                              SHA256

                                                                              9cc2e2d5feeb360b2ea9a650809468f08e13c0e997ebadf5baa69ae3c27a958e

                                                                              SHA512

                                                                              2230abef3f2ac7fff21f2af8a1df79a0ab3f7b1153ce696745ff5cef7f677bfe562dc820eb36be8e4819210ffa565d52e3b940f0cad5427d30a3aa05a4bcde2b

                                                                            • C:\Users\Admin\Desktop\malware\a\build2.exe

                                                                              Filesize

                                                                              481KB

                                                                              MD5

                                                                              f9a4f6684d1bf48406a42921aebc1596

                                                                              SHA1

                                                                              c9186ff53de4724ede20c6485136b4b2072bb6a6

                                                                              SHA256

                                                                              e0a051f93d4c1e81cc142181d14249e246be4c169645d667267134b664e75042

                                                                              SHA512

                                                                              67294a47dfef6aba404939497c403f93318841e9c5ee28b706f7506b5dff2630381e28e86f6dcbfdff2427092a515db1dc0a04e334e7f8de8b0b682269ff88fd

                                                                            • C:\Users\Admin\Desktop\malware\a\cookie250.exe

                                                                              Filesize

                                                                              304KB

                                                                              MD5

                                                                              1b099f749669dfe00b4177988018fc40

                                                                              SHA1

                                                                              c007e18cbe95b286b146531a01dde05127ebd747

                                                                              SHA256

                                                                              f7b57a665ac90377683c434a04b8b6894c369d34fdb03273778a8c9f8fdbb262

                                                                              SHA512

                                                                              87dc26b28cb2c43c788d9ae9ef384b69be52b27500bc23cdc6acc8567e51705d99ef942cdc0b23fa6a7c84d4ddaaa8f05865a8e7bb4ad943ba5deabf7a4105fd

                                                                            • C:\Users\Admin\Desktop\malware\a\keylogger.exe

                                                                              Filesize

                                                                              51KB

                                                                              MD5

                                                                              fbbc99e0b5c7a5f4b76886520f5a4f63

                                                                              SHA1

                                                                              361b841c52643792c26868f90e0330ba2ab131ae

                                                                              SHA256

                                                                              6054e52edc7112fcecaaf39f37c6bdaa35f98bfaff45d4e01802b9a8bedd2eef

                                                                              SHA512

                                                                              5de0b99a9d3f7cdee1d9ed8122c62f096b59cca93c9ad4c4eb15da6bb08d5ea07c09f2864e8a841dcc4095e890e47dd595f51c535ab37713f807a151de52cb11

                                                                            • C:\Users\Admin\Desktop\malware\a\l2.exe

                                                                              Filesize

                                                                              4.4MB

                                                                              MD5

                                                                              af6e384dfabdad52d43cf8429ad8779c

                                                                              SHA1

                                                                              c78e8cd8c74ad9d598f591de5e49f73ce3373791

                                                                              SHA256

                                                                              f327c2b5ab1d98f0382a35cd78f694d487c74a7290f1ff7be53f42e23021e599

                                                                              SHA512

                                                                              b55ba87b275a475e751e13ec9bac2e7f1a3484057844e210168e2256d73d9b6a7c7c7592845d4a3bf8163cf0d479315418a9f3cb8f2f4832af88a06867e3df93

                                                                            • C:\Users\Admin\Desktop\malware\a\msedge.exe

                                                                              Filesize

                                                                              271KB

                                                                              MD5

                                                                              c2ec3c7d003e11d0db8aab918df1e47a

                                                                              SHA1

                                                                              9c1c3421a1d0207bec271b9cd38a48cb0a1fb285

                                                                              SHA256

                                                                              97b1441bd0a459186311604d3cf3fc2b212dff334f4640d9171189080698c940

                                                                              SHA512

                                                                              bb43cf35712213ec0643a48451791da6cd8e9c4f1281980dd972e8483ddba7f56b55d23cd4fc9eca91b1ca4e1bc7370769b71cdc3e250c9f1941eb72ce278170

                                                                            • C:\Users\Admin\Desktop\malware\a\networks_profile.exe

                                                                              Filesize

                                                                              6.6MB

                                                                              MD5

                                                                              7306abcf62c8ee10a1692a6a85af9297

                                                                              SHA1

                                                                              69900ccc2400e685b981b3654af57c062ffb44e2

                                                                              SHA256

                                                                              37c9a26faec0bb21171b3968d2e4254f6ae10ff7ae0d0b1493226685bc5d3b4b

                                                                              SHA512

                                                                              cd00a60387e06fcc6f14242adb97a54575a49cf1e9b22c74aa5d8bb7617e571fc194049691e4ee0fcff8bdd659b04de62f46d07e2f3330c18ac7035134e183d1

                                                                            • C:\Users\Admin\Desktop\malware\a\regasm.exe

                                                                              Filesize

                                                                              593KB

                                                                              MD5

                                                                              f74f2df998219d602185c46107329e82

                                                                              SHA1

                                                                              a0f8eeb2e5c712e690923fdaf3b7cefc64f3d63e

                                                                              SHA256

                                                                              5f569c72db9c31528daf2e907938b9bb711ea3a050efe5bf5d514dc962c5415c

                                                                              SHA512

                                                                              b28e1eafefaf4f71666bf6c216c8672eb615a5e369bd913b85d99b2774df76ffaa489f145722a93f80f2afcb76eef40e62dcf246793bcf867d696487e9343a9f

                                                                            • C:\Users\Admin\Desktop\malware\a\robotic.exe

                                                                              Filesize

                                                                              538KB

                                                                              MD5

                                                                              6b1bbe4e391cdfd775780d8502ccbc41

                                                                              SHA1

                                                                              a910f7ac9ed8fd57f7455f04e99bcd732bc8241a

                                                                              SHA256

                                                                              2999b0ecf157b9f37dcfa1cb4a0ffff73092c416499a356fdb1558d66985e9a3

                                                                              SHA512

                                                                              9ad2ca4cc8af0b6185be87d9026da5cdac2c52ff15b0fd2ba333ff3a25016e06a294d7cf5cf32b1869a1f5e3692f071f582ba2151ac16f9be738ea7862ab57d3

                                                                            • C:\Users\Admin\Desktop\malware\a\sahost.exe

                                                                              Filesize

                                                                              499KB

                                                                              MD5

                                                                              29e3de6b17d0fdfb360834f038b59a39

                                                                              SHA1

                                                                              1e3fdca7e4dec1ebb618f69675928363657ba064

                                                                              SHA256

                                                                              8cf6a3d7e5694a0453d85e67a038bb5804b6eb8969287f1d021bdb7b95234e9d

                                                                              SHA512

                                                                              ebf889085bb105182739d7a748d8b12b26de3e47f11535260adac23beee3d5b43aa572b6043ace7ac068cee36529c3cf448986f3218aec742ab6fce4db47440a

                                                                            • C:\Users\Admin\Desktop\malware\a\stub.exe

                                                                              Filesize

                                                                              48KB

                                                                              MD5

                                                                              a7ed4ba445aa61c4632dd6579c212bf5

                                                                              SHA1

                                                                              a81d766d12a6dd8c3cec537387a089650b34e103

                                                                              SHA256

                                                                              91fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820

                                                                              SHA512

                                                                              2a0e0afdecf803657f2d67433399dc3119a3b4221334a9c8d7cb3e3e741457aaa26d2edd32377a102f1c539a4ef065cb5296d4cdfe7657993223e675e3fd4bae

                                                                            • C:\Users\Admin\Desktop\malware\a\wahost.exe

                                                                              Filesize

                                                                              712KB

                                                                              MD5

                                                                              14b98daca4a9912ad416eb7c0231cc21

                                                                              SHA1

                                                                              58328f022b71c8b3001449e87f91fbad4ac973ea

                                                                              SHA256

                                                                              850752cfce58c44ce5d48735f4d53ccc1f8d12b7e1ae00d367d9c42103d9ad99

                                                                              SHA512

                                                                              1169760e0245b4b1f2676271e0e56b62db0157a08ada4098d7dfacbf5c1e2d6cac29275c04a2d59471d7a9d9420425c07387c63fd3bc9bc4f91a9b3d5addcb0a

                                                                            • memory/132-573-0x0000000000400000-0x0000000000BD9000-memory.dmp

                                                                              Filesize

                                                                              7.8MB

                                                                            • memory/132-500-0x0000000000400000-0x0000000000BD9000-memory.dmp

                                                                              Filesize

                                                                              7.8MB

                                                                            • memory/484-2-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/484-4-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/484-9-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/484-10-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/484-11-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/484-14-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/484-8-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/484-13-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/484-3-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/484-12-0x000001FAD8DD0000-0x000001FAD8DD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/640-189-0x00007FF987C20000-0x00007FF987E29000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/684-688-0x0000000005C80000-0x0000000005C96000-memory.dmp

                                                                              Filesize

                                                                              88KB

                                                                            • memory/684-687-0x0000000000E20000-0x0000000000ED4000-memory.dmp

                                                                              Filesize

                                                                              720KB

                                                                            • memory/684-797-0x0000000006B00000-0x0000000006B8C000-memory.dmp

                                                                              Filesize

                                                                              560KB

                                                                            • memory/684-796-0x0000000005CB0000-0x0000000005CBE000-memory.dmp

                                                                              Filesize

                                                                              56KB

                                                                            • memory/772-800-0x0000000000400000-0x000000000044A000-memory.dmp

                                                                              Filesize

                                                                              296KB

                                                                            • memory/772-138-0x000000006F6C0000-0x000000006F6D5000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/772-90-0x0000000000F30000-0x0000000000FCB000-memory.dmp

                                                                              Filesize

                                                                              620KB

                                                                            • memory/772-134-0x00007FF987C20000-0x00007FF987E29000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1096-274-0x00000000001D0000-0x00000000001E2000-memory.dmp

                                                                              Filesize

                                                                              72KB

                                                                            • memory/1204-333-0x0000013C9D6F0000-0x0000013C9D712000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/1384-408-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-406-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-422-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-418-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-402-0x00000000057F0000-0x000000000580C000-memory.dmp

                                                                              Filesize

                                                                              112KB

                                                                            • memory/1384-401-0x00000000058F0000-0x0000000005A28000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/1384-400-0x0000000000880000-0x0000000000E78000-memory.dmp

                                                                              Filesize

                                                                              6.0MB

                                                                            • memory/1384-416-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-414-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-403-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-412-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-410-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-404-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1384-420-0x00000000057F0000-0x0000000005805000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/1560-257-0x0000000000410000-0x0000000000B5B000-memory.dmp

                                                                              Filesize

                                                                              7.3MB

                                                                            • memory/1560-234-0x00007FF987C20000-0x00007FF987E29000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/1716-15-0x00000000007C0000-0x00000000007C8000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/1716-16-0x00000000050F0000-0x000000000518C000-memory.dmp

                                                                              Filesize

                                                                              624KB

                                                                            • memory/1868-781-0x0000000007D40000-0x000000000826C000-memory.dmp

                                                                              Filesize

                                                                              5.2MB

                                                                            • memory/1868-709-0x00000000003B0000-0x0000000000402000-memory.dmp

                                                                              Filesize

                                                                              328KB

                                                                            • memory/1868-728-0x0000000006A70000-0x0000000007088000-memory.dmp

                                                                              Filesize

                                                                              6.1MB

                                                                            • memory/1868-725-0x00000000061F0000-0x000000000620E000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/1868-724-0x0000000005A50000-0x0000000005AC6000-memory.dmp

                                                                              Filesize

                                                                              472KB

                                                                            • memory/1868-730-0x0000000006500000-0x0000000006512000-memory.dmp

                                                                              Filesize

                                                                              72KB

                                                                            • memory/1868-732-0x00000000066D0000-0x000000000671C000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/1868-731-0x0000000006560000-0x000000000659C000-memory.dmp

                                                                              Filesize

                                                                              240KB

                                                                            • memory/1868-729-0x00000000065C0000-0x00000000066CA000-memory.dmp

                                                                              Filesize

                                                                              1.0MB

                                                                            • memory/1924-830-0x00000000058B0000-0x0000000005C07000-memory.dmp

                                                                              Filesize

                                                                              3.3MB

                                                                            • memory/2012-813-0x0000000000400000-0x0000000000BD9000-memory.dmp

                                                                              Filesize

                                                                              7.8MB

                                                                            • memory/2012-733-0x0000000000400000-0x0000000000BD9000-memory.dmp

                                                                              Filesize

                                                                              7.8MB

                                                                            • memory/2084-806-0x0000000006820000-0x0000000006888000-memory.dmp

                                                                              Filesize

                                                                              416KB

                                                                            • memory/2084-698-0x00000000009E0000-0x0000000000A7A000-memory.dmp

                                                                              Filesize

                                                                              616KB

                                                                            • memory/2084-699-0x0000000005500000-0x0000000005512000-memory.dmp

                                                                              Filesize

                                                                              72KB

                                                                            • memory/2112-399-0x0000000000400000-0x000000000178C000-memory.dmp

                                                                              Filesize

                                                                              19.5MB

                                                                            • memory/2112-316-0x0000000000400000-0x000000000178C000-memory.dmp

                                                                              Filesize

                                                                              19.5MB

                                                                            • memory/2112-321-0x0000000000400000-0x000000000178C000-memory.dmp

                                                                              Filesize

                                                                              19.5MB

                                                                            • memory/2112-315-0x0000000000400000-0x000000000178C000-memory.dmp

                                                                              Filesize

                                                                              19.5MB

                                                                            • memory/2112-387-0x0000000000400000-0x000000000178C000-memory.dmp

                                                                              Filesize

                                                                              19.5MB

                                                                            • memory/2112-314-0x0000000000400000-0x000000000178C000-memory.dmp

                                                                              Filesize

                                                                              19.5MB

                                                                            • memory/2112-301-0x0000000000400000-0x000000000178C000-memory.dmp

                                                                              Filesize

                                                                              19.5MB

                                                                            • memory/2468-258-0x0000000000A70000-0x0000000000AB8000-memory.dmp

                                                                              Filesize

                                                                              288KB

                                                                            • memory/2468-259-0x0000000002BF0000-0x0000000002BF8000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/2628-322-0x0000000000720000-0x0000000000E6B000-memory.dmp

                                                                              Filesize

                                                                              7.3MB

                                                                            • memory/2628-282-0x0000000000720000-0x0000000000E6B000-memory.dmp

                                                                              Filesize

                                                                              7.3MB

                                                                            • memory/2628-265-0x00007FF987C20000-0x00007FF987E29000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/2716-825-0x0000000000400000-0x0000000000426000-memory.dmp

                                                                              Filesize

                                                                              152KB

                                                                            • memory/3244-319-0x00007FF987C20000-0x00007FF987E29000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3244-318-0x000000006ED10000-0x000000006ED25000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/3244-292-0x0000000000F30000-0x0000000000FCB000-memory.dmp

                                                                              Filesize

                                                                              620KB

                                                                            • memory/3596-187-0x000000001EC80000-0x000000001F1A8000-memory.dmp

                                                                              Filesize

                                                                              5.2MB

                                                                            • memory/3596-178-0x000000001DC20000-0x000000001DD2A000-memory.dmp

                                                                              Filesize

                                                                              1.0MB

                                                                            • memory/3596-153-0x0000000000A00000-0x0000000000A8C000-memory.dmp

                                                                              Filesize

                                                                              560KB

                                                                            • memory/3596-186-0x000000001E580000-0x000000001E742000-memory.dmp

                                                                              Filesize

                                                                              1.8MB

                                                                            • memory/3596-185-0x0000000003030000-0x000000000304E000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/3596-184-0x000000001E030000-0x000000001E0A6000-memory.dmp

                                                                              Filesize

                                                                              472KB

                                                                            • memory/3596-181-0x000000001BAA0000-0x000000001BADC000-memory.dmp

                                                                              Filesize

                                                                              240KB

                                                                            • memory/3596-180-0x000000001BA40000-0x000000001BA52000-memory.dmp

                                                                              Filesize

                                                                              72KB

                                                                            • memory/3640-192-0x000000006F6C0000-0x000000006F6D5000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/3640-188-0x00007FF987C20000-0x00007FF987E29000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3752-214-0x0000000005C30000-0x0000000005C7C000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/3752-215-0x000000006F0A0000-0x000000006F0EC000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/3752-224-0x0000000006CC0000-0x0000000006D64000-memory.dmp

                                                                              Filesize

                                                                              656KB

                                                                            • memory/3752-225-0x0000000006FD0000-0x0000000006FE1000-memory.dmp

                                                                              Filesize

                                                                              68KB

                                                                            • memory/3752-226-0x0000000007010000-0x0000000007025000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/3752-206-0x0000000005480000-0x00000000057D7000-memory.dmp

                                                                              Filesize

                                                                              3.3MB

                                                                            • memory/4032-67-0x00000000065B0000-0x00000000065FC000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/4032-95-0x00000000078F0000-0x000000000790A000-memory.dmp

                                                                              Filesize

                                                                              104KB

                                                                            • memory/4032-112-0x0000000007C10000-0x0000000007C18000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/4032-109-0x0000000007C20000-0x0000000007C3A000-memory.dmp

                                                                              Filesize

                                                                              104KB

                                                                            • memory/4032-108-0x0000000007B30000-0x0000000007B45000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/4032-107-0x0000000007B20000-0x0000000007B2E000-memory.dmp

                                                                              Filesize

                                                                              56KB

                                                                            • memory/4032-106-0x0000000007AF0000-0x0000000007B01000-memory.dmp

                                                                              Filesize

                                                                              68KB

                                                                            • memory/4032-105-0x0000000007B60000-0x0000000007BF6000-memory.dmp

                                                                              Filesize

                                                                              600KB

                                                                            • memory/4032-52-0x00000000030B0000-0x00000000030E6000-memory.dmp

                                                                              Filesize

                                                                              216KB

                                                                            • memory/4032-53-0x00000000058C0000-0x0000000005EEA000-memory.dmp

                                                                              Filesize

                                                                              6.2MB

                                                                            • memory/4032-54-0x00000000056D0000-0x00000000056F2000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/4032-55-0x0000000005770000-0x00000000057D6000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/4032-56-0x00000000057E0000-0x0000000005846000-memory.dmp

                                                                              Filesize

                                                                              408KB

                                                                            • memory/4032-65-0x0000000006070000-0x00000000063C7000-memory.dmp

                                                                              Filesize

                                                                              3.3MB

                                                                            • memory/4032-66-0x0000000006570000-0x000000000658E000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/4032-78-0x0000000007540000-0x0000000007574000-memory.dmp

                                                                              Filesize

                                                                              208KB

                                                                            • memory/4032-79-0x000000006F180000-0x000000006F1CC000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/4032-88-0x0000000007780000-0x000000000779E000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/4032-91-0x00000000077A0000-0x0000000007844000-memory.dmp

                                                                              Filesize

                                                                              656KB

                                                                            • memory/4032-104-0x0000000007950000-0x000000000795A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/4032-94-0x0000000007F70000-0x00000000085EA000-memory.dmp

                                                                              Filesize

                                                                              6.5MB

                                                                            • memory/4444-594-0x0000000007630000-0x0000000007641000-memory.dmp

                                                                              Filesize

                                                                              68KB

                                                                            • memory/4444-583-0x0000000006250000-0x000000000629C000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/4444-584-0x000000006EE30000-0x000000006EE7C000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/4444-595-0x0000000007670000-0x0000000007685000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/4444-593-0x00000000072B0000-0x0000000007354000-memory.dmp

                                                                              Filesize

                                                                              656KB

                                                                            • memory/4444-582-0x0000000005BE0000-0x0000000005F37000-memory.dmp

                                                                              Filesize

                                                                              3.3MB

                                                                            • memory/4528-260-0x0000000006E70000-0x0000000006EC0000-memory.dmp

                                                                              Filesize

                                                                              320KB

                                                                            • memory/4528-200-0x0000000000400000-0x0000000000426000-memory.dmp

                                                                              Filesize

                                                                              152KB

                                                                            • memory/4528-261-0x0000000007090000-0x0000000007252000-memory.dmp

                                                                              Filesize

                                                                              1.8MB

                                                                            • memory/4536-17-0x00000000009E0000-0x00000000009E8000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/4980-131-0x00007FF987C20000-0x00007FF987E29000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/4980-93-0x0000000000F30000-0x0000000000FCB000-memory.dmp

                                                                              Filesize

                                                                              620KB

                                                                            • memory/4980-130-0x000000006F6C0000-0x000000006F6D5000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/4980-157-0x000000006F6C0000-0x000000006F6D5000-memory.dmp

                                                                              Filesize

                                                                              84KB

                                                                            • memory/5072-190-0x0000000006830000-0x0000000006846000-memory.dmp

                                                                              Filesize

                                                                              88KB

                                                                            • memory/5072-182-0x0000000005490000-0x000000000549A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/5072-179-0x00000000054D0000-0x0000000005562000-memory.dmp

                                                                              Filesize

                                                                              584KB

                                                                            • memory/5072-176-0x0000000005A80000-0x0000000006026000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/5072-174-0x0000000000A70000-0x0000000000B26000-memory.dmp

                                                                              Filesize

                                                                              728KB

                                                                            • memory/5072-183-0x00000000058B0000-0x00000000058CE000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/5072-191-0x000000000A790000-0x000000000A7F8000-memory.dmp

                                                                              Filesize

                                                                              416KB