Analysis

  • max time kernel
    123s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 20:48

General

  • Target

    aafec3c88c342370a233018452ada22295bfb65f6856db0223e163bbfb5afcfc.exe

  • Size

    3.0MB

  • MD5

    19833d849cf5e16a70cbd96e899eddfe

  • SHA1

    b06486c8479a0d385d09d1e8d6ffa0e68001d4dc

  • SHA256

    aafec3c88c342370a233018452ada22295bfb65f6856db0223e163bbfb5afcfc

  • SHA512

    928ca5b7d925517d80a7553549715bb5aad59660a64b98330be2b8539fdf849b7ab6e9c6c9af67f5a38e727b7a99370da8053784aeecfbe08515ab13a50dbe64

  • SSDEEP

    49152:ubKRn9WoaaexCmE2kAzkj9hrJbPNYO9dBu8lfda:ubK90HaexCmE2QjXJJYO9dplfda

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.184.225.183:30592

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Extracted

Family

xehook

C2

https://unotree.ru/

https://aiwhcpoaw.ru/

Extracted

Family

lumma

C2

https://affordcharmcropwo.shop/api

https://cleartotalfisherwo.shop/api

https://worryfillvolcawoi.shop/api

https://enthusiasimtitleow.shop/api

https://dismissalcylinderhostw.shop/api

https://diskretainvigorousiw.shop/api

https://communicationgenerwo.shop/api

https://pillowbrocccolipe.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Xehook Payload 1 IoCs
  • Detect ZGRat V1 1 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Stealc

    Stealc is an infostealer written in C++.

  • Xehook stealer

    Xehook is an infostealer written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 61 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aafec3c88c342370a233018452ada22295bfb65f6856db0223e163bbfb5afcfc.exe
    "C:\Users\Admin\AppData\Local\Temp\aafec3c88c342370a233018452ada22295bfb65f6856db0223e163bbfb5afcfc.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Users\Admin\AppData\Local\Temp\1000055001\f941c837f7.exe
        "C:\Users\Admin\AppData\Local\Temp\1000055001\f941c837f7.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4068
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
          4⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4980
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe6d779758,0x7ffe6d779768,0x7ffe6d779778
            5⤵
              PID:1996
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:2
              5⤵
                PID:3200
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:8
                5⤵
                  PID:1340
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2284 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:8
                  5⤵
                    PID:1920
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:1
                    5⤵
                      PID:1944
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:1
                      5⤵
                        PID:4748
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4656 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:1
                        5⤵
                          PID:5176
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4804 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:1
                          5⤵
                            PID:5472
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4060 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:8
                            5⤵
                              PID:5660
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:8
                              5⤵
                              • Modifies registry class
                              PID:5668
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:8
                              5⤵
                                PID:2464
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1912,i,17912358066370402191,3554910338890628928,131072 /prefetch:8
                                5⤵
                                  PID:1992
                            • C:\Users\Admin\AppData\Local\Temp\1000056001\b2df75b830.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000056001\b2df75b830.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1556
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 772
                                4⤵
                                • Program crash
                                PID:5368
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                              3⤵
                              • Loads dropped DLL
                              PID:5500
                              • C:\Windows\system32\rundll32.exe
                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                4⤵
                                • Blocklisted process makes network request
                                • Loads dropped DLL
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5608
                                • C:\Windows\system32\netsh.exe
                                  netsh wlan show profiles
                                  5⤵
                                    PID:5684
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5296
                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                                3⤵
                                  PID:5640
                                • C:\Users\Admin\AppData\Local\Temp\1000059001\amert.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1000059001\amert.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Drops file in Windows directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2936
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                  3⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  PID:5580
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:3224
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1556 -ip 1556
                                1⤵
                                  PID:5308
                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5868
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8
                                  1⤵
                                    PID:5236
                                  • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                                    C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5988
                                    • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      PID:1088
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        3⤵
                                          PID:5764
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 872
                                          3⤵
                                          • Program crash
                                          PID:2360
                                      • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        PID:5940
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          3⤵
                                            PID:5224
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            3⤵
                                            • Checks computer location settings
                                            PID:5332
                                            • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                                              "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              PID:5584
                                            • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                                              "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              PID:856
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
                                              4⤵
                                                PID:5324
                                                • C:\Windows\SysWOW64\choice.exe
                                                  choice /C Y /N /D Y /T 3
                                                  5⤵
                                                    PID:5648
                                            • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:644
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                3⤵
                                                • Modifies system certificate store
                                                PID:4752
                                            • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"
                                              2⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              PID:2844
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F
                                                3⤵
                                                • Creates scheduled task(s)
                                                PID:6060
                                            • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Modifies system certificate store
                                              PID:6004
                                            • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:5740
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                3⤵
                                                • Loads dropped DLL
                                                • Checks processor information in registry
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3816
                                            • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:3520
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                3⤵
                                                  PID:5964
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                                2⤵
                                                • Loads dropped DLL
                                                PID:3980
                                                • C:\Windows\system32\rundll32.exe
                                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                                                  3⤵
                                                  • Blocklisted process makes network request
                                                  • Loads dropped DLL
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:1488
                                                  • C:\Windows\system32\netsh.exe
                                                    netsh wlan show profiles
                                                    4⤵
                                                      PID:2144
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal
                                                      4⤵
                                                        PID:4336
                                                  • C:\Users\Admin\AppData\Local\Temp\1000193001\dirtquire.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1000193001\dirtquire.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    PID:2436
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                      3⤵
                                                        PID:5812
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Start-Process 'C:\Users\Admin\AppData\Roaming\NCDG5HJN61.exe'"
                                                          4⤵
                                                            PID:3896
                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                                                        2⤵
                                                        • Blocklisted process makes network request
                                                        • Loads dropped DLL
                                                        PID:5140
                                                    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:5512
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1088 -ip 1088
                                                      1⤵
                                                        PID:2364
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=760 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:3
                                                        1⤵
                                                          PID:3580
                                                        • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                          C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                          1⤵
                                                            PID:5572
                                                          • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                            C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe
                                                            1⤵
                                                              PID:5976

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\ProgramData\mozglue.dll

                                                              Filesize

                                                              593KB

                                                              MD5

                                                              c8fd9be83bc728cc04beffafc2907fe9

                                                              SHA1

                                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                              SHA256

                                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                              SHA512

                                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                            • C:\ProgramData\nss3.dll

                                                              Filesize

                                                              2.0MB

                                                              MD5

                                                              1cc453cdf74f31e4d913ff9c10acdde2

                                                              SHA1

                                                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                              SHA256

                                                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                              SHA512

                                                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                              Filesize

                                                              360B

                                                              MD5

                                                              62edd5e2640f0f9194b25874af6565da

                                                              SHA1

                                                              539816f022b837ed09e19d0d757a59264d1fc2fb

                                                              SHA256

                                                              6d951ea000f3e4fb0b4bb303c1dcfc61b0e6f40964daf0a55d8df0cedb21eb8a

                                                              SHA512

                                                              bcc99a6faac4a0816794ddf9b8287dd875944078c48b6842515877f56d2eedce8badf8dcda7692e1e05c90c4d1890248305d38ea17112ec8ff2d169db51110f6

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History

                                                              Filesize

                                                              148KB

                                                              MD5

                                                              410a9e74cd2aca7d2c025340ce1e4e0c

                                                              SHA1

                                                              caf0346ec07be86b5eb773010532f77027e7eae8

                                                              SHA256

                                                              7ab500d80914d4a848a634aa42487afcf97f435b49ee785cb37de40abfd2670f

                                                              SHA512

                                                              26826de6bc358a144ea93dfbdf031e80ae1efb92503e551e17a227bd85d10ddba55b4ad612b0bef131598bf894cfe19c162bc141025b0a7110f3d9b1d107ea59

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\5b997b4a-f4bf-4d00-a617-cbd80a508a91.tmp

                                                              Filesize

                                                              539B

                                                              MD5

                                                              5dbd69acb5f8d07f17d79dd5eba9e463

                                                              SHA1

                                                              9459fc781fe33d5d3807ee6c64481cc0556b2602

                                                              SHA256

                                                              8aa90626c0275830e1d14eeb37a2af01dd1a52bf58fe77318943bbc195aa6b83

                                                              SHA512

                                                              57811a63d26682b70b92dd2ec8515c7ec426485118871a9cff9fa12ab76bef748b1f996acbb99b280a27015ebbc0110c881d922dc82140820d1c446f733a197f

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies

                                                              Filesize

                                                              20KB

                                                              MD5

                                                              00825d1d9f3821187fe99d00837506a5

                                                              SHA1

                                                              1754a94fbd2c7be10d02559cf7dd830969934632

                                                              SHA256

                                                              2853ae0794ca5bc11c7a176a503e0b22ea4ccdf0b5969a77bdbd4c387a9dd499

                                                              SHA512

                                                              49f1c622b379a4b110798d2abbea957c75d34aa7a1d5195d276a45a57258b53bbc5bb54f914bc2ccc6e8a13acd68dd1d9e0e0ebb94aace99b63b15f5614f7a73

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              54ac1f1e7d6282fc483a240fc2147fb9

                                                              SHA1

                                                              2be586e2abf191361c71942cee45d1c9dd58506e

                                                              SHA256

                                                              35fa9d66d31345bfe4c9f0e236e8328a8f002739932ad0472d3674fa95c15beb

                                                              SHA512

                                                              b1f75661d70a112654e9feebb1de291c2882110ee57af1c3cdac2f4d98c5125d806daff884aa236b29343a0f286db850d6cee23d7fc5cbd4766be269117048a4

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                              Filesize

                                                              539B

                                                              MD5

                                                              e98156de37fad2155a48ad4523ebfde9

                                                              SHA1

                                                              1195f1639ad4ed47924ff6b029a9939d7fd9ac16

                                                              SHA256

                                                              eb4885570dc1aea7c3839c024a9929c52b04c6d7d9aa1d2a79d47459ba8b1441

                                                              SHA512

                                                              26f4a8de1255ef99c5ed6289423e6e4eb014d35fae29edf4232680ae85449025923c9f9ebfa893df2f7b7db8f660a2d69664b2e4f3658542422c7095743244c6

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                              Filesize

                                                              539B

                                                              MD5

                                                              d7f44c4f93b06ffe196179cbb1665924

                                                              SHA1

                                                              75b2f95e44af86f95cf046f92326bbf570093050

                                                              SHA256

                                                              1ab54bd5071a08a7b87c237610ed1df6f75f673e884223c0bbac6e8f1f20f4f3

                                                              SHA512

                                                              7565cfb2f5d2cfca33fa3accae89d05c7942bc559f43acf1a027d3bc723fb4f2180c21095152b56ff8fde6327dd1277370c5a8bb140f2783b33a25e4755cd0b9

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                              Filesize

                                                              539B

                                                              MD5

                                                              4e4f3977dcdea27ac213510d9e3a6bb9

                                                              SHA1

                                                              cd1ae71d20facaf1335e261a5bd847e729b51ebc

                                                              SHA256

                                                              e9b8f2b0901d929563994012a582c656c1471c80897bd1f1aaf768b79afdf108

                                                              SHA512

                                                              e30aa81796f5c5ebceb878ba148c3e03dcee53027e8b8c1f19ec3d11aca63098ebfc403296b23ba396b7a6ef976ae679018848f1b421776c8620faeef770f3af

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              64726cecc618d6e3003433a2dc88bf6e

                                                              SHA1

                                                              7e196b33eccfdf1f319d704014d2351c53d0dc4b

                                                              SHA256

                                                              214ef92b4c1eeb567a5d15fbd3145ca99e061e1f0029a764d0fe96bdbedd5406

                                                              SHA512

                                                              aa886786c3ffee49c14db9c69241be9d3162118694209d81fc876188ce258f38bdaf5638993f2fcaa4e341d5bd768c98ddf733a6f66c359b7ba7c7aac9d563ce

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              3c442c81f7da8c50a5bf33df9540bcc7

                                                              SHA1

                                                              abe65e0d68b88953bbdba2f64c895174cad11a2a

                                                              SHA256

                                                              f5fac2c568014b6f6a7aeaded7c0a508c05b450c347756c29d7b368efbf31fa0

                                                              SHA512

                                                              5c8613bec7bf65508664642bae7173c4add90bff8465477a1a2905466deeb1a4a0b8b969e40cc44d824580c853bb4186995c844122344a784b324b9c9c3336f9

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              c7c46cb6820214da6980e5bd57838f19

                                                              SHA1

                                                              76eda5533aa290fd7e80a3e96d79d437e1214f30

                                                              SHA256

                                                              18aa21e79a4352a58717ca0b677ba5599822e8822726e1c741a923548d654ad8

                                                              SHA512

                                                              89f0d3b8bd7213444ec5680dc8b8618737517f3579236d2b206659593cde50cb1c73ecb51d41c0fb64fa32a7dc988c299b7e4394df6f311b75b922a147a6416f

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                              Filesize

                                                              14B

                                                              MD5

                                                              9eae63c7a967fc314dd311d9f46a45b7

                                                              SHA1

                                                              caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                                                              SHA256

                                                              4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                                                              SHA512

                                                              bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                              Filesize

                                                              264KB

                                                              MD5

                                                              40e5f74099ebe6f6d87987be3b46e123

                                                              SHA1

                                                              d543a43c27254c938c81571e4d14154e4a9a0b06

                                                              SHA256

                                                              896fb35dbd376f98a50be3eea5a36e54dcd957d34482a534b3d9b39aab526e4c

                                                              SHA512

                                                              a29166d1c951cc47b6238adcce3f772684c79f6c7f5263c62acd0f7884596a42817587b2245e13196db7f4bf6cd56709b60e9893f96515436b83a1a95179dd2d

                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                              Filesize

                                                              2B

                                                              MD5

                                                              99914b932bd37a50b983c5e7c90ae93b

                                                              SHA1

                                                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                              SHA256

                                                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                              SHA512

                                                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                              Filesize

                                                              3KB

                                                              MD5

                                                              fe3aab3ae544a134b68e881b82b70169

                                                              SHA1

                                                              926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                                                              SHA256

                                                              bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                                                              SHA512

                                                              3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              d50a514bc8964e05c200ee00e5937799

                                                              SHA1

                                                              1acea97ec9d705f394154bb56934f3a9f2750cea

                                                              SHA256

                                                              4c949ceb578c967e4bdd47ace5e47a0a37b5a4cc84d2fd0a11b3005507839d15

                                                              SHA512

                                                              600ea17a611dee20b73d8fe6c8f2bae53ce8c08d6eab2900db9a3c1aae952b1c5c999ef74e54a66acb6c23304dc3f0c290c3f27f5b246be2d51b9798a00e3aa1

                                                            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                              Filesize

                                                              3.0MB

                                                              MD5

                                                              19833d849cf5e16a70cbd96e899eddfe

                                                              SHA1

                                                              b06486c8479a0d385d09d1e8d6ffa0e68001d4dc

                                                              SHA256

                                                              aafec3c88c342370a233018452ada22295bfb65f6856db0223e163bbfb5afcfc

                                                              SHA512

                                                              928ca5b7d925517d80a7553549715bb5aad59660a64b98330be2b8539fdf849b7ab6e9c6c9af67f5a38e727b7a99370da8053784aeecfbe08515ab13a50dbe64

                                                            • C:\Users\Admin\AppData\Local\Temp\1000055001\f941c837f7.exe

                                                              Filesize

                                                              1.1MB

                                                              MD5

                                                              1d38d119897d791acf7a76a460b8010d

                                                              SHA1

                                                              7872d3e5fa15017d590cb00fc2a4f74e2388a7dc

                                                              SHA256

                                                              49ffe50ccb8df0b1d2de4985b86970ec1fb564e757d48b007105e72badfb594d

                                                              SHA512

                                                              47cd9d256c65f537b3b3df9a4f3b40f9912b8eb8dfdc6c4b3e11855bcd2e4d791ccbc8fb0e5c5643d41bca2ffd766bbabd969cf27ddbb51ae490db373064f21a

                                                            • C:\Users\Admin\AppData\Local\Temp\1000056001\b2df75b830.exe

                                                              Filesize

                                                              2.3MB

                                                              MD5

                                                              fd749c8fb61e95089f5ae48e25e6755f

                                                              SHA1

                                                              a9c457a4e404d8f16fe399e4e9c92991b840dd64

                                                              SHA256

                                                              9893b06d9716b043134116ee41eb03103e1b7dc69649641c96e241e6cac15d85

                                                              SHA512

                                                              c047530479fa55f6817c551c4e88bc4ffde38e5da5ef46ea9c7d7708c25bb3708f3c2a5fb708ae12d9c3f49ed7d22375589ee46b695595a0a07b58c53ad824b4

                                                            • C:\Users\Admin\AppData\Local\Temp\1000059001\amert.exe

                                                              Filesize

                                                              1.8MB

                                                              MD5

                                                              f77620e37fb87bdebb3cf5f6f2c47f40

                                                              SHA1

                                                              363d14e2a03d08b8a47b0b2c432e08389acc7a38

                                                              SHA256

                                                              e3aaad13eb435fef8caceaa49a50e35d638da30ab706a9bcc785eda2217a5c15

                                                              SHA512

                                                              e851fb606f7fd8b983ace7b4e6edb7e37d6850aea89575d5e18db8dbb59c63ab4838c2a60d587d1cb58ebd3fabff419b2163f66847dd830debfbe0139737fa26

                                                            • C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe

                                                              Filesize

                                                              321KB

                                                              MD5

                                                              1c7d0f34bb1d85b5d2c01367cc8f62ef

                                                              SHA1

                                                              33aedadb5361f1646cffd68791d72ba5f1424114

                                                              SHA256

                                                              e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c

                                                              SHA512

                                                              53bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d

                                                            • C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe

                                                              Filesize

                                                              1.7MB

                                                              MD5

                                                              85a15f080b09acace350ab30460c8996

                                                              SHA1

                                                              3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                                              SHA256

                                                              3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                                              SHA512

                                                              ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                                            • C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe

                                                              Filesize

                                                              488KB

                                                              MD5

                                                              82053649cadec1a338509e46ba776fbd

                                                              SHA1

                                                              6d8e479a6dc76d54109bb2e602b8087d55537510

                                                              SHA256

                                                              30468f8b767772214c60a701ecfee11c634516c3e2de146cd07638ea00dd0b6e

                                                              SHA512

                                                              e4b2b219483477a73fec5a207012f77c7167bf7b7f9adcb80ee92f87ddfe592a0d520f2afee531d1cce926ef56da2b065b13630a1cc171f48db8f7987e10897a

                                                            • C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe

                                                              Filesize

                                                              418KB

                                                              MD5

                                                              0099a99f5ffb3c3ae78af0084136fab3

                                                              SHA1

                                                              0205a065728a9ec1133e8a372b1e3864df776e8c

                                                              SHA256

                                                              919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                              SHA512

                                                              5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                                            • C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe

                                                              Filesize

                                                              304KB

                                                              MD5

                                                              8510bcf5bc264c70180abe78298e4d5b

                                                              SHA1

                                                              2c3a2a85d129b0d750ed146d1d4e4d6274623e28

                                                              SHA256

                                                              096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6

                                                              SHA512

                                                              5ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d

                                                            • C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe

                                                              Filesize

                                                              158KB

                                                              MD5

                                                              586f7fecacd49adab650fae36e2db994

                                                              SHA1

                                                              35d9fb512a8161ce867812633f0a43b042f9a5e6

                                                              SHA256

                                                              cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e

                                                              SHA512

                                                              a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772

                                                            • C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe

                                                              Filesize

                                                              3.3MB

                                                              MD5

                                                              b9882fe8bb7ab2a4d094f9ff5442df1c

                                                              SHA1

                                                              e17c146530a4371e0595c195c24863935a3dee8b

                                                              SHA256

                                                              4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628

                                                              SHA512

                                                              bee33d43deb43854975e6c7a57f27ab8c6519ea3e6df51297ca670ac62831f29f6a18eff0bb0af14f9e985ebf9e2169ed97582fa64998cfb33b1d8b61ec72db4

                                                            • C:\Users\Admin\AppData\Local\Temp\1000193001\dirtquire.exe

                                                              Filesize

                                                              273KB

                                                              MD5

                                                              e795115169cc800de0392d6a675d58fd

                                                              SHA1

                                                              8dd75837e360ba1cb8acf5a3d348dd020a5da482

                                                              SHA256

                                                              17f929c1d40a7fd6f897c0b15ca9c44b2059cbccb3037c31619d87954659478e

                                                              SHA512

                                                              5fb6543e91de175bd365462a1cc87d6772e43b0effd3757b3e408b08a4de5a004de9a85e7f1d09578fa3bc6b6486c5f5016c1b879496582dbb39b2e62e168f38

                                                            • C:\Users\Admin\AppData\Local\Temp\Tmp744C.tmp

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              1420d30f964eac2c85b2ccfe968eebce

                                                              SHA1

                                                              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                              SHA256

                                                              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                              SHA512

                                                              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uqb4w1v3.vdr.ps1

                                                              Filesize

                                                              60B

                                                              MD5

                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                              SHA1

                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                              SHA256

                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                              SHA512

                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpB36A.tmp

                                                              Filesize

                                                              46KB

                                                              MD5

                                                              02d2c46697e3714e49f46b680b9a6b83

                                                              SHA1

                                                              84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                              SHA256

                                                              522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                              SHA512

                                                              60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpB3D9.tmp

                                                              Filesize

                                                              92KB

                                                              MD5

                                                              4c2e2189b87f507edc2e72d7d55583a0

                                                              SHA1

                                                              1f06e340f76d41ea0d1e8560acd380a901b2a5bd

                                                              SHA256

                                                              99a5f8dea08b5cf512ed888b3e533cc77c08dc644078793dc870abd8828c1bca

                                                              SHA512

                                                              8b6b49e55afe8a697aaf71d975fab9e906143339827f75a57876a540d0d7b9e3cbbcdd8b5435d6198900a73895cc52d2082e66ee8cec342e72f2e427dde71600

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpB5D7.tmp

                                                              Filesize

                                                              56KB

                                                              MD5

                                                              d444c807029c83b8a892ac0c4971f955

                                                              SHA1

                                                              fa58ce7588513519dc8fed939b26b05dc25e53b5

                                                              SHA256

                                                              8297a7698f19bb81539a18363db100c55e357fa73f773c2b883d2c4161f6a259

                                                              SHA512

                                                              b7958b843639d4223bef65cdc6c664d7d15b76ac4e0a8b1575201dd47a32899feff32389dcc047314f47944ebe7b774cd59e51d49202f49541bbd70ecbb31a2e

                                                            • C:\Users\Admin\AppData\Local\Temp\tmpB5F8.tmp

                                                              Filesize

                                                              220KB

                                                              MD5

                                                              8f7b748cff7053295e271cef8d4d635e

                                                              SHA1

                                                              759a3dbf7a90d994cb5f294845966ae1c874f60a

                                                              SHA256

                                                              eee14b07118c92bd1cf46eef2b25e1d691bbb67870636fd3c34cc7429bc77ef3

                                                              SHA512

                                                              48ea05c95db14f0225c557bf867b9f16ef5e2130cd038a7d6fdd3f021faa93c78266f7db32715c3d01079ac6f3377aa5e20269f7073130c7d708aae51c94ffa1

                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3808065738-1666277613-1125846146-1000\76b53b3ec448f7ccdda2063b15d2bfc3_2397ee06-28fe-4eaa-8777-f7014368c353

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              c0233d9c2cd549fce2849d3f2d36f693

                                                              SHA1

                                                              51478d556c8fbf8bafc8c335a693e063a3bd0940

                                                              SHA256

                                                              1f66967f65c5072ad3853834e58c12e113f9982cddcfc743037707e69638956e

                                                              SHA512

                                                              de3d7d2e67fbeb7892adb35d90c74a05a17bdb859b86eae3d2c579d09d863a4687c98781e3618985a0bf47bae3e17f1779deac98f49d0174c5d94757c85ef937

                                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                              Filesize

                                                              109KB

                                                              MD5

                                                              726cd06231883a159ec1ce28dd538699

                                                              SHA1

                                                              404897e6a133d255ad5a9c26ac6414d7134285a2

                                                              SHA256

                                                              12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                              SHA512

                                                              9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                            • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              15a42d3e4579da615a384c717ab2109b

                                                              SHA1

                                                              22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                              SHA256

                                                              3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                              SHA512

                                                              1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                              Filesize

                                                              109KB

                                                              MD5

                                                              154c3f1334dd435f562672f2664fea6b

                                                              SHA1

                                                              51dd25e2ba98b8546de163b8f26e2972a90c2c79

                                                              SHA256

                                                              5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                                                              SHA512

                                                              1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                                                            • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              f35b671fda2603ec30ace10946f11a90

                                                              SHA1

                                                              059ad6b06559d4db581b1879e709f32f80850872

                                                              SHA256

                                                              83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                                                              SHA512

                                                              b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                                                            • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe

                                                              Filesize

                                                              541KB

                                                              MD5

                                                              1fc4b9014855e9238a361046cfbf6d66

                                                              SHA1

                                                              c17f18c8246026c9979ab595392a14fe65cc5e9f

                                                              SHA256

                                                              f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                                              SHA512

                                                              2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                                            • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe

                                                              Filesize

                                                              304KB

                                                              MD5

                                                              cc90e3326d7b20a33f8037b9aab238e4

                                                              SHA1

                                                              236d173a6ac462d85de4e866439634db3b9eeba3

                                                              SHA256

                                                              bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                                              SHA512

                                                              b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                                            • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              48847709cc74c9829f683992de2bbe4b

                                                              SHA1

                                                              c707a197a52ba176d2d180e12dc16c99c9f5b785

                                                              SHA256

                                                              598abf6b54b1d22a93ffa1e2f7e74b6b689a14d7ae2ce822637b49f2df7e8ae0

                                                              SHA512

                                                              65fb6e42a2cb6fcf2017fd80e4afe2a95e936112b7ee410c159b3db9ada4bcf1c30d20b804bbb682e34ca66fdc51fb9f6657160c78d953009589d77936e57245

                                                            • C:\Users\Admin\Pictures\Lu2pPljdv3bimowW4gYZ3LVl.exe

                                                              Filesize

                                                              7KB

                                                              MD5

                                                              5b423612b36cde7f2745455c5dd82577

                                                              SHA1

                                                              0187c7c80743b44e9e0c193e993294e3b969cc3d

                                                              SHA256

                                                              e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                                              SHA512

                                                              c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                                            • memory/1556-84-0x0000000004F20000-0x0000000004F21000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-87-0x0000000004F90000-0x0000000004F91000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-126-0x0000000000A30000-0x0000000001001000-memory.dmp

                                                              Filesize

                                                              5.8MB

                                                            • memory/1556-85-0x0000000004F10000-0x0000000004F11000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-82-0x0000000004F30000-0x0000000004F31000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-83-0x0000000004FA0000-0x0000000004FA1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-91-0x0000000004F50000-0x0000000004F51000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-90-0x0000000004FB0000-0x0000000004FB1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-81-0x0000000004F60000-0x0000000004F61000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-80-0x0000000000A30000-0x0000000001001000-memory.dmp

                                                              Filesize

                                                              5.8MB

                                                            • memory/1556-89-0x0000000004FC0000-0x0000000004FC1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-86-0x0000000004F80000-0x0000000004F81000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/1556-88-0x0000000004F70000-0x0000000004F71000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2240-10-0x0000000005260000-0x0000000005261000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2240-0-0x0000000000620000-0x000000000092A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2240-1-0x0000000077724000-0x0000000077726000-memory.dmp

                                                              Filesize

                                                              8KB

                                                            • memory/2240-2-0x0000000000620000-0x000000000092A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2240-3-0x0000000005220000-0x0000000005221000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2240-4-0x0000000005230000-0x0000000005231000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2240-5-0x0000000005210000-0x0000000005211000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2240-6-0x0000000005250000-0x0000000005251000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2240-7-0x00000000051F0000-0x00000000051F1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2240-8-0x0000000005200000-0x0000000005201000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2240-9-0x0000000005270000-0x0000000005271000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2240-12-0x0000000000620000-0x000000000092A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2240-23-0x0000000000620000-0x000000000092A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-26-0x0000000004B80000-0x0000000004B81000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2620-78-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-159-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-166-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-24-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-852-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-25-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-895-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-130-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-231-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-32-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2620-27-0x0000000004B90000-0x0000000004B91000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2620-257-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-555-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-269-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-270-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-272-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-900-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-33-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2620-30-0x0000000004B70000-0x0000000004B71000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2620-28-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2620-29-0x0000000004B50000-0x0000000004B51000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2620-330-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-697-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/2620-31-0x0000000004B60000-0x0000000004B61000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2936-196-0x00000000053F0000-0x00000000053F1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2936-207-0x0000000000A10000-0x0000000000EC3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2936-160-0x0000000000A10000-0x0000000000EC3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2936-168-0x0000000000A10000-0x0000000000EC3000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/2936-169-0x00000000053A0000-0x00000000053A1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2936-170-0x00000000053B0000-0x00000000053B1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2936-171-0x00000000053E0000-0x00000000053E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2936-172-0x0000000005370000-0x0000000005371000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2936-173-0x0000000005390000-0x0000000005391000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2936-174-0x0000000005380000-0x0000000005381000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2936-175-0x00000000053D0000-0x00000000053D1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2936-194-0x0000000005400000-0x0000000005401000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3816-500-0x0000000000400000-0x000000000063B000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/3816-589-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                              Filesize

                                                              972KB

                                                            • memory/3816-488-0x0000000000400000-0x000000000063B000-memory.dmp

                                                              Filesize

                                                              2.2MB

                                                            • memory/4752-381-0x0000000000400000-0x0000000000452000-memory.dmp

                                                              Filesize

                                                              328KB

                                                            • memory/5296-187-0x0000029FF7370000-0x0000029FF7392000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/5296-177-0x0000029FF6F60000-0x0000029FF6F70000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/5296-193-0x00007FFE69D80000-0x00007FFE6A841000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/5296-176-0x0000029FF6F60000-0x0000029FF6F70000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/5296-222-0x0000029FF7400000-0x0000029FF7412000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/5296-223-0x0000029FF7360000-0x0000029FF736A000-memory.dmp

                                                              Filesize

                                                              40KB

                                                            • memory/5296-197-0x0000029FF6F60000-0x0000029FF6F70000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/5296-230-0x00007FFE69D80000-0x00007FFE6A841000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/5332-388-0x0000000000400000-0x0000000000592000-memory.dmp

                                                              Filesize

                                                              1.6MB

                                                            • memory/5512-305-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/5764-360-0x0000000000400000-0x000000000044C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/5764-357-0x0000000000400000-0x000000000044C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/5812-630-0x0000000000400000-0x000000000041C000-memory.dmp

                                                              Filesize

                                                              112KB

                                                            • memory/5868-145-0x00000000049A0000-0x00000000049A1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/5868-144-0x0000000004950000-0x0000000004951000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/5868-128-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/5868-167-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/5868-139-0x0000000000370000-0x000000000067A000-memory.dmp

                                                              Filesize

                                                              3.0MB

                                                            • memory/5868-158-0x0000000004990000-0x0000000004991000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/5868-150-0x0000000004940000-0x0000000004941000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/5868-148-0x0000000004930000-0x0000000004931000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/5868-140-0x0000000004960000-0x0000000004961000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/5868-143-0x0000000004970000-0x0000000004971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/5964-625-0x0000000000400000-0x0000000000408000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/5988-276-0x00000000006A0000-0x0000000000B53000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5988-853-0x00000000006A0000-0x0000000000B53000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5988-891-0x00000000006A0000-0x0000000000B53000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5988-453-0x00000000006A0000-0x0000000000B53000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5988-899-0x00000000006A0000-0x0000000000B53000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5988-658-0x00000000006A0000-0x0000000000B53000-memory.dmp

                                                              Filesize

                                                              4.7MB

                                                            • memory/5988-901-0x00000000006A0000-0x0000000000B53000-memory.dmp

                                                              Filesize

                                                              4.7MB