Malware Analysis Report

2025-08-10 23:16

Sample ID 221101-nqv4kscdfp
Target e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
SHA256 e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
Tags
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94

Threat Level: Likely malicious

The file e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94 was found to be: Likely malicious.

Malicious Activity Summary


Executes dropped EXE

Suspicious use of SetThreadContext

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-11-01 11:36

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-11-01 11:36

Reported

2022-11-01 11:39

Platform

win10-20220812-en

Max time kernel

145s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe"

Signatures

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3676 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
PID 3676 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
PID 3676 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
PID 3676 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
PID 3676 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
PID 3676 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
PID 3676 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
PID 3676 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
PID 3676 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
PID 4852 wrote to memory of 3628 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Windows\SysWOW64\schtasks.exe
PID 4852 wrote to memory of 3628 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Windows\SysWOW64\schtasks.exe
PID 4852 wrote to memory of 3628 N/A C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe C:\Windows\SysWOW64\schtasks.exe
PID 4916 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 4916 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 4916 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 4916 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 4916 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 4916 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 4916 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 4916 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 4916 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 4856 wrote to memory of 3664 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Windows\SysWOW64\schtasks.exe
PID 4856 wrote to memory of 3664 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Windows\SysWOW64\schtasks.exe
PID 4856 wrote to memory of 3664 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Windows\SysWOW64\schtasks.exe
PID 3788 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3788 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3788 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3788 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3788 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3788 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3788 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3788 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3788 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3172 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3172 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3172 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3172 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3172 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3172 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3172 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3172 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
PID 3172 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

Processes

C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe

"C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe"

C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe

C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

Network

Country Destination Domain Proto
US 52.182.143.211:443 tcp
US 209.197.3.8:80 tcp

Files

memory/3676-119-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-118-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-121-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-123-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-122-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-120-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-124-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-125-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-127-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-130-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-131-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-132-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-129-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-128-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-126-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-133-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-135-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-136-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-139-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-138-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-141-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-140-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-142-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-137-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-143-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-144-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-145-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-134-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-146-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-147-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-148-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-149-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-150-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-152-0x0000000000AB0000-0x0000000000B06000-memory.dmp

memory/3676-154-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-153-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-151-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-155-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-157-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-158-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-156-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-159-0x00000000077C0000-0x000000000788C000-memory.dmp

memory/3676-160-0x0000000007D90000-0x000000000828E000-memory.dmp

memory/3676-161-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-162-0x0000000007930000-0x00000000079C2000-memory.dmp

memory/3676-163-0x0000000005310000-0x0000000005316000-memory.dmp

memory/3676-164-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-165-0x0000000007BD0000-0x0000000007C46000-memory.dmp

memory/3676-166-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-167-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-168-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-169-0x00000000078C0000-0x00000000078DE000-memory.dmp

memory/3676-173-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-175-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-174-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-172-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-171-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-170-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-179-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-182-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-180-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/3676-181-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-184-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-186-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-189-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-188-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-187-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-185-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-178-0x0000000077A40000-0x0000000077BCE000-memory.dmp

memory/4852-177-0x0000000000402354-mapping.dmp

memory/4852-176-0x0000000000400000-0x0000000000406000-memory.dmp

memory/3628-211-0x0000000000000000-mapping.dmp

memory/4852-216-0x0000000000400000-0x0000000000406000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

MD5 f6cf9897942e0ae620d06be6858bbdf0
SHA1 0f878b006f1258033c8ef3c7a10b980f1545be73
SHA256 e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
SHA512 f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

MD5 f6cf9897942e0ae620d06be6858bbdf0
SHA1 0f878b006f1258033c8ef3c7a10b980f1545be73
SHA256 e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
SHA512 f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

MD5 f6cf9897942e0ae620d06be6858bbdf0
SHA1 0f878b006f1258033c8ef3c7a10b980f1545be73
SHA256 e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
SHA512 f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d

memory/4856-287-0x0000000000402354-mapping.dmp

memory/3664-321-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

MD5 f6cf9897942e0ae620d06be6858bbdf0
SHA1 0f878b006f1258033c8ef3c7a10b980f1545be73
SHA256 e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
SHA512 f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log

MD5 db5ef8d7c51bad129d9097bf953e4913
SHA1 8439db960aa2d431bf5ec3c37af775b45eb07e06
SHA256 1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA512 04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee

memory/4532-394-0x0000000000402354-mapping.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

MD5 f6cf9897942e0ae620d06be6858bbdf0
SHA1 0f878b006f1258033c8ef3c7a10b980f1545be73
SHA256 e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
SHA512 f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

MD5 f6cf9897942e0ae620d06be6858bbdf0
SHA1 0f878b006f1258033c8ef3c7a10b980f1545be73
SHA256 e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
SHA512 f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d

memory/2412-481-0x0000000000402354-mapping.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

MD5 f6cf9897942e0ae620d06be6858bbdf0
SHA1 0f878b006f1258033c8ef3c7a10b980f1545be73
SHA256 e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
SHA512 f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d