Resubmissions

25/04/2024, 18:41

240425-xbtfwade97 10

23/02/2024, 00:25

240223-aqsrkahd35 10

22/02/2024, 20:52

240222-znqxmafa7x 10

22/02/2024, 17:28

240222-v17zfsdd86 10

22/02/2024, 17:13

240222-vrss6sdc92 10

22/02/2024, 17:01

240222-vjm8qadc33 10

22/02/2024, 15:57

240222-ted9ksce55 10

Analysis

  • max time kernel
    246s
  • max time network
    232s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/02/2024, 00:25

General

  • Target

    6958ACC382E71103A0B83D20BBBB37D2.exe

  • Size

    232KB

  • MD5

    6958acc382e71103a0b83d20bbbb37d2

  • SHA1

    65bf64dfcabf7bc83e47ffc4360cda022d4dab34

  • SHA256

    078f586ebb8a22305540fb5982b2521f1b82e4317f286e13bab680fff0a9d164

  • SHA512

    ebfa8b6986630b3502409d38cdff54881e4bce48511c7ba4f027345296c29708112c19ec6c9181c4b0188fa1f5cbe17b3c5d44dc07f33858323c677ef9caaeae

  • SSDEEP

    3072:FdfbYSFlTBL/A9OYh6++4hY7gfv9yPQxAVUmZAzsqvj1letKv/jbNRKCnrQbW:PbYSFH/AYYh9vERVUmSAQj1la9

Malware Config

Extracted

Family

smokeloader

Botnet

tfd5

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .lkhy

  • offline_id

    OxV6DGl22io8sqMOW1zCCOlzPiv4f1Vqzw7Y8zt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://we.tl/t-uNdL2KHHdy Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0851ASdw

rsa_pubkey.plain

Extracted

Family

vidar

Version

7.9

Botnet

7f6c51bbce50f99b5a632c204a5ec558

C2

https://t.me/hypergog

https://steamcommunity.com/profiles/76561199642171824

Attributes
  • profile_id_v2

    7f6c51bbce50f99b5a632c204a5ec558

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36

Signatures

  • DcRat 6 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Vidar Stealer 5 IoCs
  • Detect ZGRat V1 1 IoCs
  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 5 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2952
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
          PID:4168
      • C:\Users\Admin\AppData\Local\Temp\6958ACC382E71103A0B83D20BBBB37D2.exe
        "C:\Users\Admin\AppData\Local\Temp\6958ACC382E71103A0B83D20BBBB37D2.exe"
        1⤵
        • DcRat
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:3916
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9172.bat" "
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
          2⤵
            PID:1740
        • C:\Users\Admin\AppData\Local\Temp\A876.exe
          C:\Users\Admin\AppData\Local\Temp\A876.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Users\Admin\AppData\Local\Temp\A876.exe
            C:\Users\Admin\AppData\Local\Temp\A876.exe
            2⤵
            • DcRat
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2548
            • C:\Windows\SysWOW64\icacls.exe
              icacls "C:\Users\Admin\AppData\Local\edb669ba-ea5c-4aa4-94ed-7c13816fff31" /deny *S-1-1-0:(OI)(CI)(DE,DC)
              3⤵
              • Modifies file permissions
              PID:1292
            • C:\Users\Admin\AppData\Local\Temp\A876.exe
              "C:\Users\Admin\AppData\Local\Temp\A876.exe" --Admin IsNotAutoStart IsNotTask
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1776
              • C:\Users\Admin\AppData\Local\Temp\A876.exe
                "C:\Users\Admin\AppData\Local\Temp\A876.exe" --Admin IsNotAutoStart IsNotTask
                4⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2376
                • C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build2.exe
                  "C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build2.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3944
                  • C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build2.exe
                    "C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build2.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:3992
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 2152
                      7⤵
                      • Program crash
                      PID:1360
                • C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build3.exe
                  "C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build3.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4640
                  • C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build3.exe
                    "C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build3.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3916
                    • C:\Windows\SysWOW64\schtasks.exe
                      /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                      7⤵
                      • DcRat
                      • Creates scheduled task(s)
                      PID:2436
        • C:\Users\Admin\AppData\Local\Temp\BF2B.exe
          C:\Users\Admin\AppData\Local\Temp\BF2B.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:2008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3992 -ip 3992
          1⤵
            PID:4492
          • C:\Users\Admin\AppData\Local\Temp\E16A.exe
            C:\Users\Admin\AppData\Local\Temp\E16A.exe
            1⤵
            • Executes dropped EXE
            PID:1812
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EB3F.bat" "
            1⤵
              PID:2328
              • C:\Windows\system32\reg.exe
                reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
                2⤵
                  PID:3192
              • C:\Users\Admin\AppData\Local\Temp\DB.exe
                C:\Users\Admin\AppData\Local\Temp\DB.exe
                1⤵
                • Executes dropped EXE
                PID:4796
              • C:\Users\Admin\AppData\Local\Temp\810.exe
                C:\Users\Admin\AppData\Local\Temp\810.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2192
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1904
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 2404
                    3⤵
                    • Program crash
                    PID:2008
                • C:\Users\Admin\AppData\Local\Temp\810.exe
                  "C:\Users\Admin\AppData\Local\Temp\810.exe"
                  2⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Checks for VirtualBox DLLs, possible anti-VM trick
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  PID:2520
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    3⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4212
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                    3⤵
                      PID:3012
                      • C:\Windows\system32\netsh.exe
                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                        4⤵
                        • Modifies Windows Firewall
                        PID:1364
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      3⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3988
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      3⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:900
                    • C:\Windows\rss\csrss.exe
                      C:\Windows\rss\csrss.exe
                      3⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Manipulates WinMonFS driver.
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1964
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4584
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        4⤵
                        • DcRat
                        • Creates scheduled task(s)
                        PID:1392
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /delete /tn ScheduledUpdate /f
                        4⤵
                          PID:2384
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5108
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1008
                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                          C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                          4⤵
                          • Executes dropped EXE
                          PID:4408
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                          4⤵
                          • DcRat
                          • Creates scheduled task(s)
                          PID:2344
                        • C:\Windows\windefender.exe
                          "C:\Windows\windefender.exe"
                          4⤵
                          • Executes dropped EXE
                          PID:4004
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                            5⤵
                              PID:3144
                              • C:\Windows\SysWOW64\sc.exe
                                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                6⤵
                                • Launches sc.exe
                                PID:3368
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1904 -ip 1904
                      1⤵
                        PID:3908
                      • C:\Users\Admin\AppData\Local\Temp\5314.exe
                        C:\Users\Admin\AppData\Local\Temp\5314.exe
                        1⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        PID:4200
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          PID:1548
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 460
                            3⤵
                            • Program crash
                            PID:4500
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 444
                            3⤵
                            • Program crash
                            PID:1624
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe"
                        1⤵
                        • Enumerates system info in registry
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:2216
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffee0999758,0x7ffee0999768,0x7ffee0999778
                          2⤵
                            PID:556
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:2
                            2⤵
                              PID:4764
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:1
                              2⤵
                                PID:2584
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:1
                                2⤵
                                  PID:4456
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:8
                                  2⤵
                                    PID:4496
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:8
                                    2⤵
                                      PID:3204
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4520 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:1
                                      2⤵
                                        PID:3096
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:8
                                        2⤵
                                          PID:2316
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5068 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:8
                                          2⤵
                                            PID:1044
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:8
                                            2⤵
                                              PID:3996
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5060 --field-trial-handle=1824,i,10185665786591706051,14843039761372875905,131072 /prefetch:1
                                              2⤵
                                                PID:4516
                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                              1⤵
                                                PID:4736
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                PID:3832
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                  C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:1692
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                    3⤵
                                                    • DcRat
                                                    • Creates scheduled task(s)
                                                    PID:1224
                                              • C:\Windows\windefender.exe
                                                C:\Windows\windefender.exe
                                                1⤵
                                                • Executes dropped EXE
                                                • Modifies data under HKEY_USERS
                                                PID:1008
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1548 -ip 1548
                                                1⤵
                                                  PID:4828
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1548 -ip 1548
                                                  1⤵
                                                    PID:1800
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                    C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    PID:3468
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:2092
                                                  • C:\Windows\System32\rundll32.exe
                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                    1⤵
                                                      PID:4444
                                                    • C:\Windows\System32\Taskmgr.exe
                                                      "C:\Windows\System32\Taskmgr.exe"
                                                      1⤵
                                                      • Enumerates VirtualBox registry keys
                                                      • Loads dropped DLL
                                                      • Drops file in Windows directory
                                                      • Checks SCSI registry key(s)
                                                      • Checks processor information in registry
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:992
                                                      • C:\Windows\system32\mmc.exe
                                                        "C:\Windows\system32\mmc.exe"
                                                        2⤵
                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2600
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                      1⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      PID:3824
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:1992

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      c1a837e7fe0cd4bf1d70c7b4d8844d55

                                                      SHA1

                                                      b9b2d408095400ff0be067d8c6eed6ba0312ef3c

                                                      SHA256

                                                      0e3dcc979a1e43003bdc7253cb4094c0385d2099c14dc12a4e85fded6f76dc97

                                                      SHA512

                                                      720c2aded6054feee530553c84ce238ef4952ce2b622917c840ffa2a937f77cfe2ba55a6212af0a650f7f8286d30088ec385de584e3fe1f4b2ca7901136d16a8

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                      Filesize

                                                      724B

                                                      MD5

                                                      8202a1cd02e7d69597995cabbe881a12

                                                      SHA1

                                                      8858d9d934b7aa9330ee73de6c476acf19929ff6

                                                      SHA256

                                                      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                                                      SHA512

                                                      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                                                      Filesize

                                                      410B

                                                      MD5

                                                      b75792b3a5c6302d72594ee6a5c75468

                                                      SHA1

                                                      84af5f4b1d1e6ea20b23b5ccf59ebc2575e20c6a

                                                      SHA256

                                                      a82d0a3c5e228a0c4ec7d7139c2109dd7aae07ef5f6bb1800551c84019010b9c

                                                      SHA512

                                                      45535ea57d9e91041eba1ce1f2eea62215ed89b6bc6843e3566e62d98d2ad020a1bf57f3e831ac3abf422e1b76ac53836189828e05b2f24df5a77e38b9dc99df

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

                                                      Filesize

                                                      392B

                                                      MD5

                                                      6eaa95b86ed3bd15ad61992ed7a34aad

                                                      SHA1

                                                      745a405bfb11012b160a3c7b77302427ed06eff6

                                                      SHA256

                                                      567b3dc1d429c602a332e8efb8fa616a051ef52b3d7980ea00b23afb21a75f54

                                                      SHA512

                                                      09ff3c7f584fe517cc65a94116420f909e40be189c18a6a7d0f79e59ea10baeef28a61cede9e47d131755470a9db0c610cb486d3061e249479868f1fc9148b2d

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      b64872ff1ba649140b283dc160c44872

                                                      SHA1

                                                      e93e07c7b1edfa0d41e5a705b2046b2d441a182b

                                                      SHA256

                                                      cb5aa3a31d471e84f2c735f39611a2f675df0d160abb77871cb85d56bbeedb2b

                                                      SHA512

                                                      5930dbbb3593d8b766b349681c32f90ecd9f6f38a891c165d3f54d8cc08eed05939d14d831abf00dbf3b3c31f0f83d6561297c1ffade7bbb8c7c82488ebe910a

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                      Filesize

                                                      371B

                                                      MD5

                                                      f1119eb49b33e652a308c4b57c489ee7

                                                      SHA1

                                                      2a57c7c8e542f83abc667678f68ec28837ae56a8

                                                      SHA256

                                                      6fbd82c709fe5ae0e21d9b7f15dba74120c0aab21b0e6a4e93864d3f92d0705c

                                                      SHA512

                                                      43a878de8ef967aabb540adf82d3251597839e03f31a0130bb8576e80b5a8bc73e4bcb69c2b6adcd9c4fe322a9c2a2f495adcbe97d1d5662780c8f4d4f2b741b

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      0688f4686c2ed5c415a8b86578320369

                                                      SHA1

                                                      49092a4cb6817198b8cdc8b33c95b368f551a8c9

                                                      SHA256

                                                      3959aae474b3b4b473be429926a614cbf02c7691365d985d2870b511d97fac37

                                                      SHA512

                                                      8915f4aaa2728b29803ae04688436f1cdf8b4a6af91ba8a6bd4a4be22061e50bc38a7a6d23ca4ff4f245580d9d6716918e1df75553c0fbb39000cbd5d6ac541c

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      ddcb1bd3840e86d4c5742b8f9de98fce

                                                      SHA1

                                                      f1dd106c5be8f2af64ef17a2ad4713d75f30093a

                                                      SHA256

                                                      cbf83c152733412fc732b3a8f5dffbbfc1b81795b96dd884d74a5ef2c4874380

                                                      SHA512

                                                      95bee71df5da6d74181e2bf6bcfdab5d7723246976a186d6bf0941ba34965e89dbb3de1ac962da455e00f4296ebf2abb14799a62add13ce8c915ce4918748369

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      ad823f7381d01042a41f82280fd65070

                                                      SHA1

                                                      4fc07a7029391e30cdb68b42d00019a106c182af

                                                      SHA256

                                                      2addcbd59738dfed136b2c5154bef7afcba06403209d343514759adbabd7fe97

                                                      SHA512

                                                      b417d3b41a240f593d622f70a307845e6293d75ca793f1ed97e7d90e9228831b6e2324648396d2e08977342cbec54e9027abdeaed1684eed2d3f3a7a2d57e141

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      f42c50b075f6a2af322b418970be62b8

                                                      SHA1

                                                      6bb8d36610f0df7dc1f81537531cfcddbaa3919d

                                                      SHA256

                                                      1d43bc2671ca326d31fc11328556c247e78187c906109fc3e145293ba555a7ff

                                                      SHA512

                                                      551cb00163f141b5265fa50993488be84ed7935af15409735ed358d588f82a997a4521d1521ef0ed321d240839b4fc326606d420d8d09fa1b613078d58d04093

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      257KB

                                                      MD5

                                                      19cb64e03cab13bf5506d8f1ccab4c7f

                                                      SHA1

                                                      6ed493b19131034a44b5a54742e2b78c33ffa82b

                                                      SHA256

                                                      2a5d5fb11ea7418510e9b6b06c343491df94af42169ce31e383f58927ed10735

                                                      SHA512

                                                      d79149007c657e2694b67c5994ff5c6c8eedfce4820432a357e7a5fb9144bfeaef8034d8063ca732afa9a5f8dd5e723fa14fabaf220ac47e8897f05375bcd48f

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                      Filesize

                                                      257KB

                                                      MD5

                                                      1cce8ad93f59a666f8d99b3c5bd2b3b5

                                                      SHA1

                                                      d6f0edc5843cba307b60495dbeee9cb90be59427

                                                      SHA256

                                                      1619a04f7af3dde500751199df599a5b780615d477067b97ffbbb6647afec15f

                                                      SHA512

                                                      037cf3cd0ae9fa8fe12535e275a03ac4f9824c68eacab932c84449a0866f136e66e374ab39ea37b4c737340890d4bac015f46b7b71e7cd4b8ad76b112a99cd23

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      4ac937c900ccdf562faa5a124dc6a126

                                                      SHA1

                                                      0ecada53d97c9ad092087dc659014b223598a712

                                                      SHA256

                                                      fbbafc7e31a22f773beed60862c089223c09fb49dd6deef94c46692e94cd7723

                                                      SHA512

                                                      e0708e5702aca2bb63742d45ac0fa56fd56e590b1b51a05bc93cae048055365c15e2120cfd1c2a82efdc1e527be04fe4d32dec28a2e778d7958f4adb4d62adc6

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                      Filesize

                                                      2B

                                                      MD5

                                                      99914b932bd37a50b983c5e7c90ae93b

                                                      SHA1

                                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                      SHA256

                                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                      SHA512

                                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                      Filesize

                                                      14KB

                                                      MD5

                                                      44591be64cb5c6b634232eac089f1576

                                                      SHA1

                                                      2b7a9d605edbfcfe758b814ab78f0967e94a6166

                                                      SHA256

                                                      08d77ab354e683ef0303871415038d700e54449977681b86717c9bd639ac39fe

                                                      SHA512

                                                      70e2b75bc1e8340a4aa9e0c0affc5efd8e6141873d769b33cb13c042b0e6e53e5a829704f9f19a17f9343c688f3e68e11c5145cd0e9fb762b17a9e489f5072df

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                      Filesize

                                                      14KB

                                                      MD5

                                                      0e7d6c11877ab4cd61082f246aa40094

                                                      SHA1

                                                      ce0778834733041d3a96540b565cb95d4509c826

                                                      SHA256

                                                      c87d8d066f50c7a67f1abd7ad6e3e8d26b65e651d3865b925722b4ca21fbea6b

                                                      SHA512

                                                      04283061e0af6aaa54eb4b67c81e48d833d671fee98ece4c1a25bbedd639ac419793582e1eb6c866528c7e23d17a1746cb860722324e467b8b90793dd9db5ea9

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                                      Filesize

                                                      14KB

                                                      MD5

                                                      6a261569e6cd5cd1e2e427ba894c40f7

                                                      SHA1

                                                      6d9a1482896207be7c0f6d22121601fed9c9eac2

                                                      SHA256

                                                      3351a8cbcc7abf5ea61501bc71defb3a95a9294b2345b33987c093a80f618bbb

                                                      SHA512

                                                      893782bac736294e9135891ef9c0f6450a386af6c575f7158ce85a35daece4ac4a235039f4c2c143c9b276b4b8f121007629f69b311192c42d08468c681d7841

                                                    • C:\Users\Admin\AppData\Local\Temp\5314.exe

                                                      Filesize

                                                      6.5MB

                                                      MD5

                                                      eda36c51a126d6f6989443acfe507e2c

                                                      SHA1

                                                      b87c4c8dec5f3259ec3cb629876ce48da221b1a1

                                                      SHA256

                                                      91d1a1d9d3610c197e3fdbde79040cebf01eddfef34f8e7b77a4b81cbcecd461

                                                      SHA512

                                                      79f7e89c7f6d8b3d6225ac2fb9931c42bd4a7e81dd88f8a6017369007c848ab87843a84f9973653fefa31960a354102684279573587061cb7bfb1f9775fc5dc0

                                                    • C:\Users\Admin\AppData\Local\Temp\810.exe

                                                      Filesize

                                                      4.1MB

                                                      MD5

                                                      ede22b4f418d4f709751af82df78dd26

                                                      SHA1

                                                      eb456429d597f433d08ca7e0b308bad06e5146c2

                                                      SHA256

                                                      7e6d1d4791c9f75281a2ae8fd3ee8a4d0d6521bdd0dd7751b378718e8567f142

                                                      SHA512

                                                      cd33f35bc08061d8c5222973ab7d3f38b87623ec99a927c97d76b4d04e431194803bdac770a91a593cc448f6d2e07018359929dfd505bf5ddc1b4b3952c3c571

                                                    • C:\Users\Admin\AppData\Local\Temp\810.exe

                                                      Filesize

                                                      3.9MB

                                                      MD5

                                                      51def4926e372019607ea10360fa2d1e

                                                      SHA1

                                                      3c2da59b38cc903bbc1b8836f0e4b213901bc23e

                                                      SHA256

                                                      2a8440d60d3c01f95b109b24d4391b130e60c1d62e1c80cd79c0b33e76349ad1

                                                      SHA512

                                                      1ec732861b8ef882174cc0cdf1bd509b2625b3621986a22a3a4654bf40792396a03ad603c6bc9a6ab28ba53b5ab4d51557f9ff0e50a5fcb594daca6205e68362

                                                    • C:\Users\Admin\AppData\Local\Temp\9172.bat

                                                      Filesize

                                                      77B

                                                      MD5

                                                      55cc761bf3429324e5a0095cab002113

                                                      SHA1

                                                      2cc1ef4542a4e92d4158ab3978425d517fafd16d

                                                      SHA256

                                                      d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                                                      SHA512

                                                      33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                                                    • C:\Users\Admin\AppData\Local\Temp\A876.exe

                                                      Filesize

                                                      665KB

                                                      MD5

                                                      50089d99910b582b7b4f71d7b58935f6

                                                      SHA1

                                                      62cc51de0072c86e29d9a7f089cea93fc1b025f8

                                                      SHA256

                                                      5c70bc40d13eb71f83e1f37a09851e624e081df0a837e7d66a3c76111ec893d7

                                                      SHA512

                                                      096773ee3e9e067d4b243ea9b1d8a145401a41b2ac608869539c459b7b1f487e15858b3a15996f22013800218a32ed565a238cee0fe25e74db18cab9a835e887

                                                    • C:\Users\Admin\AppData\Local\Temp\BF2B.exe

                                                      Filesize

                                                      2.3MB

                                                      MD5

                                                      768351e7fb4e73a68d6128a4ab7ccc4e

                                                      SHA1

                                                      b2e42ae8d8f154800c6ade37ad6ce4e903da79de

                                                      SHA256

                                                      e1af5fed9e816a4f21c4f25e8d1388d8e8deac07c9cacd2889b749f2ec28a396

                                                      SHA512

                                                      76f96b1e6d962937822c05814c77ac8903ac612db07d8daa7ddb2fb7443e6151afc880daf5a8a3e42b4f3e8dc081f391cab3e8098fb4af8ac31ef81a66d20941

                                                    • C:\Users\Admin\AppData\Local\Temp\DB.exe

                                                      Filesize

                                                      1.9MB

                                                      MD5

                                                      5d5c4c47ccae89a73b6f1f42542c834c

                                                      SHA1

                                                      5b59fee042ea4897f88a573dbe38ae4cb71e3f7e

                                                      SHA256

                                                      03cdea5b068f994f8c15ded8e91c32a2638a7f646e68e3988a80e6a377ef6dec

                                                      SHA512

                                                      dc9ab01fb72f331ff0e7e384db5a43ad41215914c5363d8ab90de7a78ad5d3ef02511585a25189699c1b31d300ff42edd98988660b65da91058dc3fa6f5a786b

                                                    • C:\Users\Admin\AppData\Local\Temp\E16A.exe

                                                      Filesize

                                                      5.6MB

                                                      MD5

                                                      479342d62078aaf31881972c7574f6f2

                                                      SHA1

                                                      382fa9a95746ca6199e7dfb9ae2bd035f4000fb4

                                                      SHA256

                                                      a6b59e0a275b5314935a3f812a5ba7dd5d5cc9524d3a6efdeb3a103eea386f6d

                                                      SHA512

                                                      0e74e3e0b993968220e712ffd94a76c00d35f0452494d62b3f6780c80cc0cae2e9982978830c54bed3a57d17a5a84abbdc4c0cbb5961afcae785048ac4ac47da

                                                    • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

                                                      Filesize

                                                      742KB

                                                      MD5

                                                      544cd51a596619b78e9b54b70088307d

                                                      SHA1

                                                      4769ddd2dbc1dc44b758964ed0bd231b85880b65

                                                      SHA256

                                                      dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

                                                      SHA512

                                                      f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jylcrckd.hku.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

                                                      Filesize

                                                      99KB

                                                      MD5

                                                      09031a062610d77d685c9934318b4170

                                                      SHA1

                                                      880f744184e7774f3d14c1bb857e21cc7fe89a6d

                                                      SHA256

                                                      778bd69af403df3c4e074c31b3850d71bf0e64524bea4272a802ca9520b379dd

                                                      SHA512

                                                      9a276e1f0f55d35f2bf38eb093464f7065bdd30a660e6d1c62eed5e76d1fb2201567b89d9ae65d2d89dc99b142159e36fb73be8d5e08252a975d50544a7cda27

                                                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                                      Filesize

                                                      281KB

                                                      MD5

                                                      d98e33b66343e7c96158444127a117f6

                                                      SHA1

                                                      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                                                      SHA256

                                                      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                                                      SHA512

                                                      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                                                    • C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build2.exe

                                                      Filesize

                                                      334KB

                                                      MD5

                                                      c6d3d647baad8a5b93b81d2487f4f072

                                                      SHA1

                                                      e9c1105dc41f85d4f7e94d4e004f8427787c8802

                                                      SHA256

                                                      7754125653413cfca3bde887fb2a22f0cd5144ec447bb274c69b005861b70a0a

                                                      SHA512

                                                      55425dc95161e627e19e17f1bb910f958dade0c2b12da5eaad31159f0e2dc5217ff293c52f39d860d399807d5b4a814f1bb24376c58b40cc171d298282052049

                                                    • C:\Users\Admin\AppData\Local\cbe7fa11-e456-4382-a089-989b1b454d30\build3.exe

                                                      Filesize

                                                      299KB

                                                      MD5

                                                      41b883a061c95e9b9cb17d4ca50de770

                                                      SHA1

                                                      1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                                                      SHA256

                                                      fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                                                      SHA512

                                                      cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      ac4917a885cf6050b1a483e4bc4d2ea5

                                                      SHA1

                                                      b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                                                      SHA256

                                                      e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                                                      SHA512

                                                      092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                      Filesize

                                                      19KB

                                                      MD5

                                                      9556408ed74344a332317c7ba1385cdb

                                                      SHA1

                                                      627f50601815ccd89e7a202e18dcb96db4b9b644

                                                      SHA256

                                                      261c439cc690427734bd5ad97bfe93632eb70c5a83911bb9edafff4ee47fe597

                                                      SHA512

                                                      44ad6a5e748e469c59090eae295bd54652fd1d75e1ab2d6a0a7eb6cb079ee7d960dde3c1d36eceebf191bb496123c843d777cf61941203d1511575b8a1704d5c

                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                      Filesize

                                                      19KB

                                                      MD5

                                                      2fea1e323bf5b221eb9136e6eca024ba

                                                      SHA1

                                                      aa270086c0274e1703fc595bde3acfd257f0bd34

                                                      SHA256

                                                      0e008737c2673f3e693d0519665849ec6267efda0d9cea13d590c4a21e880a12

                                                      SHA512

                                                      162f795450214647005cf92c41329cf0d973ea5c669752cc69f0fbf00307e4814d9ff2ff5ed18bff7e04af688b4f65871d1cfc6f64f227b52e8c53f4818cd8a7

                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                      Filesize

                                                      19KB

                                                      MD5

                                                      8570cff1c327283ff2faf7ad17ad0aac

                                                      SHA1

                                                      4c9e0aba97c4b8835e02fa8029b1af28ce740f1b

                                                      SHA256

                                                      f1ef672a91904f05759f12dddb861d4da909b67321b687509999d06a484d3400

                                                      SHA512

                                                      68668037b66d6c9b34e181626053e703108ef4c0c2aa9e44fb66f16fb62bbffb22121a5e077afdcb3cec5b1a77c6ce0c470b74da3c56e130c0f57c0d1493cc4a

                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                      Filesize

                                                      19KB

                                                      MD5

                                                      1274d25c93b696f21472eef062497046

                                                      SHA1

                                                      bf427dc3454fd5dc3ad253ae39faecd6de28ca98

                                                      SHA256

                                                      9aab67894f57f1f1470183a77cf4d57ca8b0bd0239b20cbf6ab3eaa61282caf7

                                                      SHA512

                                                      ec42941957b17874010351a38b7f6e7e502e53355ae80908897ed5dea994e67ce5a3789d254b4fcb5337a17fd3bf271d1fdc6e32a6b9a514a200bf39d84c1034

                                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                      Filesize

                                                      19KB

                                                      MD5

                                                      f4abd1129d302ffa2bab4f2a6e5d0889

                                                      SHA1

                                                      56dce1d4c5f9eda22ae1987496ce7de912d9a8a4

                                                      SHA256

                                                      93a8a97294d01ac2063138151af958cbaec88878690a1c0b9c44b64621514ba7

                                                      SHA512

                                                      622572dd0b33468aeaa29256f9c4620ce007b6f31748076ad8813098d8435e1c16d4cfc73b48f4667fdc1f33f4353168c3eb0d2ecb6e4eaa05e622b5050dc229

                                                    • C:\Windows\windefender.exe

                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      8e67f58837092385dcf01e8a2b4f5783

                                                      SHA1

                                                      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                                                      SHA256

                                                      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                                                      SHA512

                                                      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                                                    • memory/1700-21-0x00000000025C0000-0x0000000002656000-memory.dmp

                                                      Filesize

                                                      600KB

                                                    • memory/1700-22-0x0000000002700000-0x000000000281B000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/1776-44-0x0000000002690000-0x000000000272E000-memory.dmp

                                                      Filesize

                                                      632KB

                                                    • memory/1812-143-0x0000000002DD0000-0x0000000002DD1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-141-0x0000000002DB0000-0x0000000002DB1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-160-0x0000000000B90000-0x0000000001667000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1812-154-0x0000000002F30000-0x0000000002F70000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/1812-155-0x0000000002F30000-0x0000000002F70000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/1812-153-0x0000000002F30000-0x0000000002F70000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/1812-151-0x0000000002F30000-0x0000000002F70000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/1812-152-0x0000000002F30000-0x0000000002F70000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/1812-150-0x0000000000B90000-0x0000000001667000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1812-148-0x0000000000B90000-0x0000000001667000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1812-145-0x0000000002E00000-0x0000000002E01000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-123-0x0000000000B90000-0x0000000001667000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1812-128-0x0000000000B70000-0x0000000000B71000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-129-0x0000000000B80000-0x0000000000B81000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-131-0x0000000000B90000-0x0000000001667000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/1812-130-0x0000000002D10000-0x0000000002D11000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-132-0x0000000002D20000-0x0000000002D21000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-133-0x0000000002D30000-0x0000000002D31000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-134-0x0000000002D40000-0x0000000002D41000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-135-0x0000000002D50000-0x0000000002D51000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-136-0x0000000002D60000-0x0000000002D61000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-137-0x0000000002D70000-0x0000000002D71000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-138-0x0000000002D80000-0x0000000002D81000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-139-0x0000000002D90000-0x0000000002D91000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-140-0x0000000002DA0000-0x0000000002DA1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-146-0x0000000002E10000-0x0000000002E11000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-142-0x0000000002DC0000-0x0000000002DC1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-147-0x0000000002F20000-0x0000000002F21000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1812-144-0x0000000002DE0000-0x0000000002DE1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1904-210-0x0000000007A30000-0x0000000007A4E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/1904-213-0x0000000007B70000-0x0000000007B8A000-memory.dmp

                                                      Filesize

                                                      104KB

                                                    • memory/1904-212-0x00000000081B0000-0x000000000882A000-memory.dmp

                                                      Filesize

                                                      6.5MB

                                                    • memory/1904-191-0x00000000065A0000-0x00000000065BE000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/1904-192-0x0000000006670000-0x00000000066BC000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/1904-197-0x0000000006B20000-0x0000000006B66000-memory.dmp

                                                      Filesize

                                                      280KB

                                                    • memory/1904-198-0x00000000079D0000-0x0000000007A04000-memory.dmp

                                                      Filesize

                                                      208KB

                                                    • memory/1904-199-0x000000007FB90000-0x000000007FBA0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1904-201-0x000000006F050000-0x000000006F3A7000-memory.dmp

                                                      Filesize

                                                      3.3MB

                                                    • memory/1904-214-0x0000000007BB0000-0x0000000007BBA000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/1904-211-0x0000000007A50000-0x0000000007AF4000-memory.dmp

                                                      Filesize

                                                      656KB

                                                    • memory/1904-180-0x0000000006010000-0x0000000006076000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/1904-200-0x000000006EEF0000-0x000000006EF3C000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/1904-190-0x00000000060F0000-0x0000000006447000-memory.dmp

                                                      Filesize

                                                      3.3MB

                                                    • memory/1904-215-0x0000000072430000-0x0000000072BE1000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/1904-181-0x0000000006080000-0x00000000060E6000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/1904-174-0x0000000005110000-0x0000000005146000-memory.dmp

                                                      Filesize

                                                      216KB

                                                    • memory/1904-175-0x0000000072430000-0x0000000072BE1000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/1904-176-0x0000000005230000-0x0000000005240000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1904-177-0x0000000005230000-0x0000000005240000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/1904-178-0x0000000005870000-0x0000000005E9A000-memory.dmp

                                                      Filesize

                                                      6.2MB

                                                    • memory/1904-179-0x0000000005820000-0x0000000005842000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/2008-87-0x0000000000530000-0x0000000000B42000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/2008-84-0x0000000000530000-0x0000000000B42000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/2008-86-0x0000000000530000-0x0000000000B42000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/2008-85-0x0000000000530000-0x0000000000B42000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/2008-88-0x0000000077130000-0x00000000772D9000-memory.dmp

                                                      Filesize

                                                      1.7MB

                                                    • memory/2008-89-0x00000000011F0000-0x00000000011F1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2008-90-0x0000000000530000-0x0000000000B42000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/2008-91-0x0000000077130000-0x00000000772D9000-memory.dmp

                                                      Filesize

                                                      1.7MB

                                                    • memory/2008-83-0x0000000000530000-0x0000000000B42000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/2008-79-0x0000000000530000-0x0000000000B42000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/2008-82-0x0000000000530000-0x0000000000B42000-memory.dmp

                                                      Filesize

                                                      6.1MB

                                                    • memory/2008-81-0x00000000771A6000-0x00000000771A8000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/2192-173-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                      Filesize

                                                      9.1MB

                                                    • memory/2192-172-0x0000000002F50000-0x000000000383B000-memory.dmp

                                                      Filesize

                                                      8.9MB

                                                    • memory/2192-218-0x0000000002F50000-0x000000000383B000-memory.dmp

                                                      Filesize

                                                      8.9MB

                                                    • memory/2192-217-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                      Filesize

                                                      9.1MB

                                                    • memory/2192-171-0x0000000002B40000-0x0000000002F45000-memory.dmp

                                                      Filesize

                                                      4.0MB

                                                    • memory/2376-195-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2376-57-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2376-47-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2376-193-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2376-56-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2376-103-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2376-258-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2376-196-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2376-49-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2376-48-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2520-220-0x0000000002A80000-0x0000000002E86000-memory.dmp

                                                      Filesize

                                                      4.0MB

                                                    • memory/2520-221-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                                      Filesize

                                                      9.1MB

                                                    • memory/2548-26-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2548-27-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2548-40-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2548-23-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/2548-25-0x0000000000400000-0x0000000000537000-memory.dmp

                                                      Filesize

                                                      1.2MB

                                                    • memory/3300-4-0x0000000005290000-0x00000000052A6000-memory.dmp

                                                      Filesize

                                                      88KB

                                                    • memory/3916-1-0x0000000000640000-0x0000000000740000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/3916-5-0x0000000000400000-0x000000000044A000-memory.dmp

                                                      Filesize

                                                      296KB

                                                    • memory/3916-110-0x0000000000400000-0x0000000000406000-memory.dmp

                                                      Filesize

                                                      24KB

                                                    • memory/3916-3-0x0000000000400000-0x000000000044A000-memory.dmp

                                                      Filesize

                                                      296KB

                                                    • memory/3916-2-0x0000000000630000-0x000000000063B000-memory.dmp

                                                      Filesize

                                                      44KB

                                                    • memory/3916-115-0x0000000000400000-0x0000000000406000-memory.dmp

                                                      Filesize

                                                      24KB

                                                    • memory/3916-117-0x0000000000400000-0x0000000000406000-memory.dmp

                                                      Filesize

                                                      24KB

                                                    • memory/3916-118-0x0000000000410000-0x0000000000413000-memory.dmp

                                                      Filesize

                                                      12KB

                                                    • memory/3944-69-0x0000000000600000-0x0000000000700000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/3944-70-0x00000000021B0000-0x00000000021E6000-memory.dmp

                                                      Filesize

                                                      216KB

                                                    • memory/3992-74-0x0000000000400000-0x0000000000649000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/3992-71-0x0000000000400000-0x0000000000649000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/3992-80-0x0000000000400000-0x0000000000649000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/3992-106-0x0000000000400000-0x0000000000649000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/4212-234-0x0000000006C30000-0x0000000006C7C000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/4212-235-0x000000007F1D0000-0x000000007F1E0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4212-236-0x000000006EF50000-0x000000006EF9C000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/4212-237-0x000000006F140000-0x000000006F497000-memory.dmp

                                                      Filesize

                                                      3.3MB

                                                    • memory/4212-229-0x00000000054B0000-0x00000000054C0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4212-230-0x0000000006200000-0x0000000006557000-memory.dmp

                                                      Filesize

                                                      3.3MB

                                                    • memory/4212-225-0x00000000054B0000-0x00000000054C0000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4212-222-0x0000000072430000-0x0000000072BE1000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/4212-246-0x00000000078E0000-0x0000000007984000-memory.dmp

                                                      Filesize

                                                      656KB

                                                    • memory/4640-114-0x00000000009C0000-0x00000000009C4000-memory.dmp

                                                      Filesize

                                                      16KB

                                                    • memory/4640-113-0x0000000000B80000-0x0000000000C80000-memory.dmp

                                                      Filesize

                                                      1024KB