Analysis

  • max time kernel
    167s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2025, 01:41

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • Renames multiple (3286) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file 4 IoCs
  • Executes dropped EXE 15 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8037e46f8,0x7ff8037e4708,0x7ff8037e4718
      2⤵
        PID:4400
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:2
        2⤵
          PID:1888
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:1344
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:8
          2⤵
            PID:2152
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
            2⤵
              PID:1664
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:1728
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                2⤵
                  PID:3768
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3984
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:1
                  2⤵
                    PID:4028
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                    2⤵
                      PID:3808
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                      2⤵
                        PID:112
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                        2⤵
                          PID:4832
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:1
                          2⤵
                            PID:2096
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5644 /prefetch:8
                            2⤵
                              PID:2940
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:1
                              2⤵
                                PID:3500
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6236 /prefetch:8
                                2⤵
                                  PID:3284
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1656
                                • C:\Users\Admin\Downloads\ArcticBomb.exe
                                  "C:\Users\Admin\Downloads\ArcticBomb.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:2696
                                • C:\Users\Admin\Downloads\ArcticBomb.exe
                                  "C:\Users\Admin\Downloads\ArcticBomb.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:5028
                                • C:\Users\Admin\Downloads\ArcticBomb.exe
                                  "C:\Users\Admin\Downloads\ArcticBomb.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:5008
                                • C:\Users\Admin\Downloads\ArcticBomb.exe
                                  "C:\Users\Admin\Downloads\ArcticBomb.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:428
                                • C:\Users\Admin\Downloads\ArcticBomb.exe
                                  "C:\Users\Admin\Downloads\ArcticBomb.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:4488
                                • C:\Users\Admin\Downloads\ArcticBomb.exe
                                  "C:\Users\Admin\Downloads\ArcticBomb.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:3320
                                • C:\Users\Admin\Downloads\ArcticBomb.exe
                                  "C:\Users\Admin\Downloads\ArcticBomb.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:1444
                                • C:\Users\Admin\Downloads\ArcticBomb.exe
                                  "C:\Users\Admin\Downloads\ArcticBomb.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:1092
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:1
                                  2⤵
                                    PID:1296
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:1
                                    2⤵
                                      PID:960
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6280 /prefetch:8
                                      2⤵
                                        PID:1140
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:1
                                        2⤵
                                          PID:2432
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6452 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5028
                                        • C:\Users\Admin\Downloads\ClassicShell.exe
                                          "C:\Users\Admin\Downloads\ClassicShell.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Writes to the Master Boot Record (MBR)
                                          • System Location Discovery: System Language Discovery
                                          PID:4152
                                        • C:\Users\Admin\Downloads\ClassicShell.exe
                                          "C:\Users\Admin\Downloads\ClassicShell.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Writes to the Master Boot Record (MBR)
                                          • System Location Discovery: System Language Discovery
                                          PID:2960
                                        • C:\Users\Admin\Downloads\ClassicShell.exe
                                          "C:\Users\Admin\Downloads\ClassicShell.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Writes to the Master Boot Record (MBR)
                                          • System Location Discovery: System Language Discovery
                                          PID:3760
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:1
                                          2⤵
                                            PID:5100
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:1
                                            2⤵
                                              PID:5028
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6532 /prefetch:8
                                              2⤵
                                                PID:3320
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6492 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2180
                                              • C:\Users\Admin\Downloads\HawkEye.exe
                                                "C:\Users\Admin\Downloads\HawkEye.exe"
                                                2⤵
                                                • Chimera
                                                • Executes dropped EXE
                                                • Drops desktop.ini file(s)
                                                • Drops file in Program Files directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1100
                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                  "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                                  3⤵
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2084
                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:17410 /prefetch:2
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of SendNotifyMessage
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4928
                                              • C:\Users\Admin\Downloads\HawkEye.exe
                                                "C:\Users\Admin\Downloads\HawkEye.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:960
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4964 /prefetch:2
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4200
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:1
                                                2⤵
                                                  PID:3724
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1316 /prefetch:1
                                                  2⤵
                                                    PID:5060
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6372 /prefetch:8
                                                    2⤵
                                                      PID:2312
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2020,2474951388007768525,4776902132339895924,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:8
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:3292
                                                    • C:\Users\Admin\Downloads\butterflyondesktop.exe
                                                      "C:\Users\Admin\Downloads\butterflyondesktop.exe"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2396
                                                      • C:\Users\Admin\AppData\Local\Temp\is-34DT4.tmp\butterflyondesktop.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-34DT4.tmp\butterflyondesktop.tmp" /SL5="$F0202,2719719,54272,C:\Users\Admin\Downloads\butterflyondesktop.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1752
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:552
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:2632

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        3931e46762578be54cbee8d3c2e7ff09

                                                        SHA1

                                                        d08560ee5fc64eb50cbd7480b83caad5a2f4b590

                                                        SHA256

                                                        24e09e312cd01b3f3a37c99e9234564f2b1d29393c3c944e25c335ce7ca056bd

                                                        SHA512

                                                        bbec8b583b3c055dc4a636f94398bfbfe1af115685f9e033f28dabfcc42645ca9f8d40acc2c857fc77421c319264b256e9485169616eadeb17f4bf1fcd959585

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        e55832d7cd7e868a2c087c4c73678018

                                                        SHA1

                                                        ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                                        SHA256

                                                        a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                                        SHA512

                                                        897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        c2d9eeb3fdd75834f0ac3f9767de8d6f

                                                        SHA1

                                                        4d16a7e82190f8490a00008bd53d85fb92e379b0

                                                        SHA256

                                                        1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                                        SHA512

                                                        d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\27a769ae-be99-4e1a-8762-fc05ab930ccd.tmp

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        1a71b64b2d9783628b692d2a7b4fa5cb

                                                        SHA1

                                                        efb202a12493a6d5ede961d5df32bb389b9d6076

                                                        SHA256

                                                        b9e6f06571f86a810f7e76b8ce78387e9f4c5307e20d72d10c1cb1cfab5eb102

                                                        SHA512

                                                        c169a67ba5ffe25090be9b342b66c5c6ecf1fe1565727d5631c053d15a3835786633c79b2db7aa9bf3a3c4df046669eb2ea7d38b9b7d84a70a7c6d2a36443420

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        0a9f7497baae8cf915f5e31f26f5200f

                                                        SHA1

                                                        00fd4529f447e457364df79479f857e3a72d9d2b

                                                        SHA256

                                                        792f6ec7d54e76dca478a962b276712834e2effee78a56a6d6b2b13cf9a56a91

                                                        SHA512

                                                        f0a8b7dee2fc1744eb3e53ca5a2ecb06502dd1c78f8b1b5957b2471134f8f7970537d60ef77c68af786e7bfd3fb4d34117e4ea054b3ef4991d23a4a9d165a3d1

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                        Filesize

                                                        496B

                                                        MD5

                                                        34a72154ed9746a609b29d25ad8d6469

                                                        SHA1

                                                        ee1fc6413972b90af4973bc1c158c47011e757b5

                                                        SHA256

                                                        629a1e55ae58d7e9e13caf2aabc58ad73415b514df679a5e15ac561b1b549f10

                                                        SHA512

                                                        2789dcc6843a73666ed06d51a7bfb8e92dd7c0a82062dc0d252d883e4c943fc229932fdb1410e9d40d7a7dd965623f3df582640a0952adf7feb7e05a68e37d5c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        153f33ad839343c5586ee9e07edc11f8

                                                        SHA1

                                                        126e2806d0ad8a6a20d54b570c2b613fe2d42b02

                                                        SHA256

                                                        b8d35c37e7f547c87b5c31f354aa38ce645a0ba21d2f39509c7e3e50673c6096

                                                        SHA512

                                                        5adb3b257e632df434f7150e077c0b6207ee67465db54947f669bc4ada91fd5966fd7dbaa61be713238f0a6c9b4748cd013f6ef916c75ee46b1227bbcdb267bc

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        b2fb6913407614861e3a2099b8742033

                                                        SHA1

                                                        bed8f1346a3d4da9a0f77002ac2f118e4f1b8488

                                                        SHA256

                                                        98c5f3300724896ee922b1979185e018cb8282be84ad764f4b78d04d045082e7

                                                        SHA512

                                                        faf385dbae3473fbadde738214fffebacf3c115926a6a783863f1bcb6945d40fd6635bcdadcaabe133893452e6640d9f0845a00e358d1abfa19b0c4188e96c54

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        c95692ed1e2f07e551eb319cddd0f7cf

                                                        SHA1

                                                        852f77f65f13561c3b08adc279bfee6dd983c708

                                                        SHA256

                                                        513cca192f02054411adb2c1181d8748e431f6f9ffd794c59f5f7817502150e0

                                                        SHA512

                                                        ac806e370d21c8ca41be61cbc5582bf30bc836f3fd0949bafd272123132f30f0f2f96deb1cbe2365b465f9c5200cb20d1661ab11eada2c95e9cde86e52e2db7f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        8961d0fd7cd3b1ab44c9242e94d22553

                                                        SHA1

                                                        f7e50f4dab44832978ef2e7356654e6928fd81e6

                                                        SHA256

                                                        878c66ce11adba9fe29e2be574f98e2fe39a4df09508be04605b3ebf69d8fb5e

                                                        SHA512

                                                        d5f2b65806ed1e61d32c5a2e4900f7c350dfbece45125244904fdd5284787a78cc7cd9b0994704bdf72381ac2baf8755b9623d175be3e15a8415706b465c8b0d

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        8948dfbc7bc87af1220f563aa05de907

                                                        SHA1

                                                        e54b53cf9d0b584b31127241e683bf187fcbe80f

                                                        SHA256

                                                        77a23f71d9374a4142dc292263675306d0aba62cd93f6ed80849bceea290e5fc

                                                        SHA512

                                                        7f6eb92594ccc88d8ef18ea642d402fd67d1b741ac3004fba37ccbdd0ee5bc56a0684d59dbf103d5392feedf2903879df1e850a376ff25815bead3c1dc8c74eb

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        0c70b63b153734878fb109b63d0e4bbe

                                                        SHA1

                                                        487e7ee31208e493abd3e4f406aad8402111d1d2

                                                        SHA256

                                                        a5558f0d3426c952a15ce35fef1c916dcb773c89b5b7939454ecb6838a353a14

                                                        SHA512

                                                        28b26267697e925d6e6170e4b25ed61b6e564d8bb446e0277e6ab5449ef03174ce83db67187f693bc21682c1138088f8a09cad122694abb778644666e48de6a5

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        917720916d98773dcec4a5d1884362b3

                                                        SHA1

                                                        7b39da86d5f05cf3eb19d84434adaefa46ea2adb

                                                        SHA256

                                                        893791d0c2918771dbd2e440863545ace30dbeceba1e75d0fc26502641b7a4a3

                                                        SHA512

                                                        528e20f5a84f3054d6c307f544191915d08f55e8b298ba7ecb482ef6a89e1d1f41bd97a797086ed907596a66cabf4c54ffc5dd463df4b062b4f35185e3d489e1

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        6ef7218442bec18b15a581764fa02303

                                                        SHA1

                                                        75c3bb128085281c3a8a96bc290da7672916b673

                                                        SHA256

                                                        c98d14d5a76e0764fbbf1b6048a2a74ee9de7a2eeb1d8742647e2102273fc5bd

                                                        SHA512

                                                        9f266b927b9d1648316f717bc7965cf0e2aee48d29f859f1283fc0154804c77881de2f5e62a7f13f41018e61b0f380fa8aad7bfc757872e6407fdede6d9c11a0

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        15b3f92fe9ef7f933c3f787427637d4b

                                                        SHA1

                                                        93366b19cece95d944673edce9c6835eda09f577

                                                        SHA256

                                                        5bb854ca1a1d396adc8f767c17960cc87ca81a9b9bc37575e749df2998913940

                                                        SHA512

                                                        c6c02b57230b199ea64e6768a9fbd195d2288538307b04cb46a68af117c2a326c340807380005e9fef4a1ad644bfcb0fec5f9ffbdf49643601c3fafe6635a778

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        e32ffee32eaa54b27ba4e611c2d5f48d

                                                        SHA1

                                                        d2ebca7c91d4cf4c0e34460d0bb97e85f0a577cd

                                                        SHA256

                                                        1ae451ca72646b0916b13cf81ea217eb86aeea39279c0bd4f49a729e2dd9e3e7

                                                        SHA512

                                                        bdabfb30e043401864c0e6bd3611741687572f460b0c8e5d7d1e9b74a96bf74fe0feda74cbbf042897c40467469856673de8571a1687c9512ed8e240b3eb6586

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        6121f8eefc7f1f525a464b4232d78ed9

                                                        SHA1

                                                        b250a501a633300b8fb1418d9262165494593212

                                                        SHA256

                                                        a805e6f0055facc930f986fd53f7344ea66c86dc72108a36fb89bf8fbc8a1f87

                                                        SHA512

                                                        eac25b8d0a2051c2f242d82e6099e5575cd18423bc20590b5cb0eb16815618c8b7edc9468662b5a595588eed3c7a988d276c3e74ce74fb7181631d7219423604

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        874B

                                                        MD5

                                                        cabcf66c7d07354dd15ec0f4442de8cf

                                                        SHA1

                                                        7a07ff475b45132ee53490ef9fca33064d07bd9b

                                                        SHA256

                                                        2525eaaf987769ca365ace29ec9d8a64562b343aa05af2c9cbded952317399bb

                                                        SHA512

                                                        7c2c6371c5c8d0b8ad555b3cd4b92408777352255d599914b6959002bc71362bfb88835a421d1bf13f5972ffcc8a2a4e63f20fb76186ae773e38f8d618a7fe1f

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        892e36931cdc1bf5cfef3452bc3496c2

                                                        SHA1

                                                        274ff57cec9a1699ad3086624194d004ce2a078a

                                                        SHA256

                                                        4b0d702181c37aac3576f84689386cf8de4b8f864fe8373c5d52afd00b677e2a

                                                        SHA512

                                                        fdd31fe3306d65e56754ccc485804c0a32e61cce937dd2be4b1a278ad3097792a7db8ecdfc363b5ecf01700c91980ba91ca7e13c88d45d38cd3a47a1c38c1b60

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57fc52.TMP

                                                        Filesize

                                                        874B

                                                        MD5

                                                        1b7d3d4457fb61129ecceb5ca824035c

                                                        SHA1

                                                        132ed776f5d64d1ab3ef994a538d2f2c9dbd8bca

                                                        SHA256

                                                        943c80148488df7499ebc44667bb5ff44673699f06907bbd2cfb9f982a0d0937

                                                        SHA512

                                                        685cad65b3a4b2412cb0383bd577c887871eb71c6d7c3b9b3b41dee37feb0ee40c98402584a0316cffd8248fe3b7aef32cb16afcfb0692e585950d0050f403a0

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        6752a1d65b201c13b62ea44016eb221f

                                                        SHA1

                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                        SHA256

                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                        SHA512

                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        0fe2da7dd3cde7e6fcf718d1726c9a9a

                                                        SHA1

                                                        45ae21a16a2c358024cfe9f8b1ae4e441a97fd9a

                                                        SHA256

                                                        e5dc4304ee1cb5908464bcc99f66735b4afc3e59c2c36294088d28105fa4b2d9

                                                        SHA512

                                                        dc5415961fdc06091fe6ffbf57a1dd10a45e37903ef88e5c796c6f9a425568bfa7bf4879c7a9d7e9bc0c34e9ed8bed48843b140a1c10c0c894e5d61a0bd935f1

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        6aff5830a3bd0dc4bb245825685f38d9

                                                        SHA1

                                                        5d4843ac23025313bd39c2c06d50cb4ccb871982

                                                        SHA256

                                                        a4cdafac6646beef98ede455c553721db8cc44d42729a564baf900195de1e4c1

                                                        SHA512

                                                        87cb349ca3b644c9bb627c34d67e09c572186da3208090ee9931a73cd8e5aa81f0a45f796dd7ef959037310141c6a9a755e86ed635d0456dcc6d6e2a4825af13

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        20afb443d884a93d71f0e0b093a9e89c

                                                        SHA1

                                                        f68e2872b5f0a6a568fb93d04852fc9a0254bd8f

                                                        SHA256

                                                        467727db01198daf5115d77fbc01ea2b41343e961292d6246791c14c80988dac

                                                        SHA512

                                                        8eb51ce526801118c8913819de5a2d1da227931a319b90ff6a87a6d92505d284bc35d4eacd2c952702166062578077f921443402ff9565b4115f42b19c201aeb

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        2e0cf9e208e56fbeca6d5a658f93755a

                                                        SHA1

                                                        bcf00ed2554c226cb6e94b3d66fec10d1ea069eb

                                                        SHA256

                                                        4bd353e9e3d624c412d3e8287c7e29ff8873bb8e2743cad609c5569e9b9d6d25

                                                        SHA512

                                                        b531305aed754733ea81f8d74ee445189efc6cbccccb0366d7ad57694b4961c724d91beaee4e78cbf966b9b8c0e457d6f708e2effc8d8fff9226754e64a643e5

                                                      • C:\Users\Admin\AppData\Local\Temp\is-34DT4.tmp\butterflyondesktop.tmp

                                                        Filesize

                                                        688KB

                                                        MD5

                                                        c765336f0dcf4efdcc2101eed67cd30c

                                                        SHA1

                                                        fa0279f59738c5aa3b6b20106e109ccd77f895a7

                                                        SHA256

                                                        c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

                                                        SHA512

                                                        06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

                                                      • C:\Users\Admin\Downloads\Unconfirmed 382355.crdownload

                                                        Filesize

                                                        232KB

                                                        MD5

                                                        60fabd1a2509b59831876d5e2aa71a6b

                                                        SHA1

                                                        8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                                        SHA256

                                                        1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                                        SHA512

                                                        3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                                      • C:\Users\Admin\Downloads\Unconfirmed 627965.crdownload

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        1535aa21451192109b86be9bcc7c4345

                                                        SHA1

                                                        1af211c686c4d4bf0239ed6620358a19691cf88c

                                                        SHA256

                                                        4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6

                                                        SHA512

                                                        1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da

                                                      • C:\Users\Admin\Downloads\Unconfirmed 730799.crdownload

                                                        Filesize

                                                        125KB

                                                        MD5

                                                        ea534626d73f9eb0e134de9885054892

                                                        SHA1

                                                        ab03e674b407aecf29c907b39717dec004843b13

                                                        SHA256

                                                        322eb96fc33119d8ed21b45f1cd57670f74fb42fd8888275ca4879dce1c1511c

                                                        SHA512

                                                        c8cda90323fd94387a566641ec48cb086540a400726032f3261151afe8a981730688a4dcd0983d9585355e22833a035ef627dbd1f643c4399f9ddce118a3a851

                                                      • C:\Users\Admin\Downloads\Unconfirmed 90572.crdownload

                                                        Filesize

                                                        6.8MB

                                                        MD5

                                                        c67dff7c65792e6ea24aa748f34b9232

                                                        SHA1

                                                        438b6fa7d5a2c7ca49837f403bcbb73c14d46a3e

                                                        SHA256

                                                        a848bf24651421fbcd15c7e44f80bb87cbacd2599eb86508829537693359e032

                                                        SHA512

                                                        5e1b0b024f36288c1d2dd4bc5cf4e6b7d469e1e7e29dcef748d17a92b9396c94440eb27348cd2561d17593d8c705d4d9b51ae7b49b50c6dee85f73dec7100879

                                                      • memory/1100-447-0x0000000010000000-0x0000000010010000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/1100-452-0x0000000004DA0000-0x0000000004DBA000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/1752-8425-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                        Filesize

                                                        752KB

                                                      • memory/2396-3621-0x0000000000400000-0x0000000000414000-memory.dmp

                                                        Filesize

                                                        80KB

                                                      • memory/2396-8424-0x0000000000400000-0x0000000000414000-memory.dmp

                                                        Filesize

                                                        80KB

                                                      • memory/2696-256-0x0000000000400000-0x0000000000454000-memory.dmp

                                                        Filesize

                                                        336KB

                                                      • memory/2696-254-0x0000000000400000-0x0000000000454000-memory.dmp

                                                        Filesize

                                                        336KB

                                                      • memory/2960-383-0x0000000000400000-0x0000000000AD8000-memory.dmp

                                                        Filesize

                                                        6.8MB

                                                      • memory/3760-385-0x0000000000400000-0x0000000000AD8000-memory.dmp

                                                        Filesize

                                                        6.8MB

                                                      • memory/4152-349-0x0000000000400000-0x0000000000AD8000-memory.dmp

                                                        Filesize

                                                        6.8MB

                                                      • memory/5028-277-0x0000000000400000-0x0000000000454000-memory.dmp

                                                        Filesize

                                                        336KB