Malware Analysis Report

2024-09-11 10:25

Sample ID 240612-b4pshayamc
Target 5a88e41319733128f3f156fb66558056.bin
SHA256 41d57f7a1e1e8452aecc9f76b8ae63f3b9b63b84b659adcc9b5c54cea98ce44e
Tags
amadey b2c2c1 trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

41d57f7a1e1e8452aecc9f76b8ae63f3b9b63b84b659adcc9b5c54cea98ce44e

Threat Level: Known bad

The file 5a88e41319733128f3f156fb66558056.bin was found to be: Known bad.

Malicious Activity Summary

amadey b2c2c1 trojan

Amadey

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Program crash

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-12 01:42

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 01:42

Reported

2024-06-12 01:44

Platform

win7-20240508-en

Max time kernel

142s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe"

Signatures

Amadey

trojan amadey

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe N/A

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe

"C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe"

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 osdhs.in.ne udp

Files

memory/1996-1-0x0000000000270000-0x0000000000370000-memory.dmp

memory/1996-2-0x0000000001830000-0x000000000189B000-memory.dmp

memory/1996-3-0x0000000000400000-0x0000000000470000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

MD5 5a88e41319733128f3f156fb66558056
SHA1 e7917ddb12db5f9bb8ea7e03953b908242518778
SHA256 cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66
SHA512 9b6e9ac639df78bbbafa3fc272695b19563368da2adeed02327fdf320a274b9a848820fc386fd947ae7c3eaf2dffcafbff05cced7a1bae135cae6b959fbf4c99

memory/1996-19-0x0000000000270000-0x0000000000370000-memory.dmp

memory/1996-18-0x0000000000400000-0x0000000001825000-memory.dmp

memory/1996-17-0x0000000001830000-0x000000000189B000-memory.dmp

memory/1996-22-0x0000000000400000-0x0000000000470000-memory.dmp

memory/1996-21-0x0000000000400000-0x0000000001825000-memory.dmp

memory/2560-28-0x0000000000400000-0x0000000001825000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\737914667933

MD5 5fdc3ee98a682a16a7146dc20c412899
SHA1 46c945d4f2de3705e4b62568df93bd7853a2f86a
SHA256 b1af24955c8bf424dfb53f3210da10ed851ada348d42cdd55dff40275a47f17a
SHA512 da09f3c90547a12f736086c52e54b9c4beeea0ee1c38a0f35a5ebb5866087a81bbf73e942b7cb554d94eb0e5fd6cd0f53c79f29359648ece92493ffb000d5b56

memory/2560-33-0x0000000000400000-0x0000000001825000-memory.dmp

memory/2560-40-0x0000000000400000-0x0000000001825000-memory.dmp

memory/2560-44-0x0000000000400000-0x0000000001825000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-12 01:42

Reported

2024-06-12 01:44

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe"

Signatures

Amadey

trojan amadey

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\Dctooux.job C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe

"C:\Users\Admin\AppData\Local\Temp\cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 752

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 780

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 856

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 896

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 924

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 868

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 1140

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 1164

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 1240

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 1092

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 836

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

"C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 880

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 1308

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1812 -ip 1812

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 472

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 572

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 604

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 616

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 692

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 840

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 840

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 860

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 988

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 1160

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 1160

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 1152

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 1420

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1528 -ip 1528

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 1256

Network

Country Destination Domain Proto
GB 23.44.234.16:80 tcp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 64.253.107.13.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 57.234.16.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 greendag.ru udp
US 8.8.8.8:53 jkshb.su udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
BR 189.61.54.32:80 jkshb.su tcp
BR 189.61.54.32:80 jkshb.su tcp
BR 189.61.54.32:80 jkshb.su tcp
US 8.8.8.8:53 32.54.61.189.in-addr.arpa udp
US 8.8.8.8:53 osdhs.in.ne udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 26.178.89.13.in-addr.arpa udp
US 8.8.8.8:53 udp
N/A 40.119.249.228:443 tcp

Files

memory/824-1-0x0000000001840000-0x0000000001940000-memory.dmp

memory/824-2-0x0000000003570000-0x00000000035DB000-memory.dmp

memory/824-3-0x0000000000400000-0x0000000000470000-memory.dmp

memory/824-5-0x0000000000400000-0x0000000001825000-memory.dmp

memory/824-6-0x0000000001840000-0x0000000001940000-memory.dmp

memory/824-8-0x0000000003570000-0x00000000035DB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e221f72865\Dctooux.exe

MD5 5a88e41319733128f3f156fb66558056
SHA1 e7917ddb12db5f9bb8ea7e03953b908242518778
SHA256 cea7821a8bd43d9f0f409521c41c4b49b3c228fc820b1c00dcca80e6efe87c66
SHA512 9b6e9ac639df78bbbafa3fc272695b19563368da2adeed02327fdf320a274b9a848820fc386fd947ae7c3eaf2dffcafbff05cced7a1bae135cae6b959fbf4c99

memory/824-16-0x0000000000400000-0x0000000000470000-memory.dmp

memory/1812-21-0x0000000000400000-0x0000000001825000-memory.dmp

memory/1812-22-0x0000000000400000-0x0000000001825000-memory.dmp

memory/824-25-0x0000000000400000-0x0000000000470000-memory.dmp

memory/1812-26-0x0000000000400000-0x0000000001825000-memory.dmp

memory/824-24-0x0000000000400000-0x0000000001825000-memory.dmp

memory/1528-33-0x0000000000400000-0x0000000001825000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\808065738166

MD5 1ad3af912d5909ec6ef8ffb8993bab5c
SHA1 12ba6e1846974f1778f03b8bf9fc394bac66a216
SHA256 d3624b6c2089ec253c392d5ec34ad2b3b0ea9a7810ac0f6791015b33d3b45919
SHA512 29d5ee587416c5ba6ad301ec66a85e511f6fcbbb96aa65aeb6e0ce9af9353acd285255b76257a26bae145352e42f7676f5e40485d1349881a1728fe93fa84bef

memory/1528-45-0x0000000000400000-0x0000000001825000-memory.dmp