Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
01-12-2021 21:36
Static task
static1
Behavioral task
behavioral1
Sample
71e36a035a5dd66b5af24feb944ec65d.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
71e36a035a5dd66b5af24feb944ec65d.exe
Resource
win10-en-20211014
General
-
Target
71e36a035a5dd66b5af24feb944ec65d.exe
-
Size
333KB
-
MD5
71e36a035a5dd66b5af24feb944ec65d
-
SHA1
adf7f623fc3999a00393888bd4feb9acb9072e52
-
SHA256
2325867f4393e53af12fb842a6b406979bd6d96a8503d70fda2280b0103f56b2
-
SHA512
10537d6a552bfd08eb46c0d7840a2ec9fd12f884d78af740fad2750e1e18dc520f2234429e80631d73270abc5ff1076c7ecbbae44a1d37e745d8691ab66490cf
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Extracted
redline
92.255.76.197:38637
Extracted
amadey
2.85
185.215.113.35/d2VxjasuwS/index.php
Extracted
icedid
2904573523
placingapie.ink
Extracted
raccoon
1.8.3-hotfix
2b57df1b9672fee319e2dc39c0f6a5bc1eef79f4
-
url4cnc
http://91.219.236.207/forestbump12
http://185.225.19.18/forestbump12
http://91.219.237.227/forestbump12
https://t.me/forestbump12
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3544-163-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/3544-164-0x0000000000418EE6-mapping.dmp family_redline behavioral2/memory/1364-183-0x0000000000860000-0x0000000000898000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1516-148-0x00000000001C0000-0x00000000001E1000-memory.dmp family_arkei behavioral2/memory/1516-149-0x0000000000400000-0x00000000004D8000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
Processes:
34F6.exe396C.exe4033.exe4630.exe34F6.exe563E.exe60FE.exe396C.exe7BBB.exetkools.exetkools.exetkools.exetkools.exeEF56.exeFA.exeFA.exetkools.exepid process 2240 34F6.exe 588 396C.exe 1176 4033.exe 1516 4630.exe 2888 34F6.exe 208 563E.exe 768 60FE.exe 3544 396C.exe 1364 7BBB.exe 3824 tkools.exe 2768 tkools.exe 3316 tkools.exe 2964 tkools.exe 2412 EF56.exe 2212 FA.exe 4604 FA.exe 4956 tkools.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
563E.exeEF56.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 563E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EF56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EF56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 563E.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tkools.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation tkools.exe -
Deletes itself 1 IoCs
Processes:
pid process 3056 -
Loads dropped DLL 4 IoCs
Processes:
regsvr32.exe4630.exepid process 1180 regsvr32.exe 1516 4630.exe 1516 4630.exe 1516 4630.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\563E.exe themida C:\Users\Admin\AppData\Local\Temp\563E.exe themida behavioral2/memory/208-152-0x0000000001380000-0x0000000001A62000-memory.dmp themida behavioral2/memory/208-153-0x0000000001380000-0x0000000001A62000-memory.dmp themida behavioral2/memory/208-154-0x0000000001380000-0x0000000001A62000-memory.dmp themida behavioral2/memory/208-155-0x0000000001380000-0x0000000001A62000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\EF56.exe themida C:\Users\Admin\AppData\Local\Temp\EF56.exe themida behavioral2/memory/2412-239-0x0000000000D60000-0x00000000014A2000-memory.dmp themida behavioral2/memory/2412-240-0x0000000000D60000-0x00000000014A2000-memory.dmp themida behavioral2/memory/2412-242-0x0000000000D60000-0x00000000014A2000-memory.dmp themida behavioral2/memory/2412-243-0x0000000000D60000-0x00000000014A2000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
563E.exeEF56.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 563E.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EF56.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
563E.exeEF56.exepid process 208 563E.exe 2412 EF56.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
71e36a035a5dd66b5af24feb944ec65d.exe34F6.exe396C.exetkools.exeFA.exedescription pid process target process PID 2752 set thread context of 3756 2752 71e36a035a5dd66b5af24feb944ec65d.exe 71e36a035a5dd66b5af24feb944ec65d.exe PID 2240 set thread context of 2888 2240 34F6.exe 34F6.exe PID 588 set thread context of 3544 588 396C.exe 396C.exe PID 3824 set thread context of 2768 3824 tkools.exe tkools.exe PID 3824 set thread context of 3316 3824 tkools.exe tkools.exe PID 3824 set thread context of 2964 3824 tkools.exe tkools.exe PID 2212 set thread context of 4604 2212 FA.exe FA.exe -
Drops file in Windows directory 4 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2336 2964 WerFault.exe tkools.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
71e36a035a5dd66b5af24feb944ec65d.exe4033.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 71e36a035a5dd66b5af24feb944ec65d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4033.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4033.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 71e36a035a5dd66b5af24feb944ec65d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 71e36a035a5dd66b5af24feb944ec65d.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
4630.exeEF56.exe563E.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4630.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EF56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EF56.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 563E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 563E.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4630.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 3328 timeout.exe 2164 timeout.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main\OperationalData = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\ImageStoreRandomFolder = "sp3q2od" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 0100000054ffc4ccc6f0a5ebeaa97e2379ddb1335c2a503cb97f7d1593cbcc944304890ae706f651d9fa5ab8c52918eea4782f7213f88c0c2736bec8ad4710bcd8afb2cdd3a21c6e7146a6013fe857cc0f5d6ceec5ea0c8e3a7e52b89310b98a9f74f2926ef45a6d7a72787547042701b12a3ef1b022d8a7b3f6d9e9aa463fc8c5f23a7f741a536e671f94178e9ceb9d19815c6778bfaa675b40cabadb09d9c2cac9aa73bd35bf5fc1ed624c6dd2f42ab700db3d73e156e846fb463389797155d199a3fd3366c54c9a7c45f2a9c425c48f48de5149a85584edc6e96befb698c14c026bc37dcb1ffa9d6cb58d6494342f14faedee9133875c53436ffacae0bb5865a4fb8f948513d1075eaa81ae60d85fcdb4b9dce8a49a2bc110c579fd17abf13a1f2be8f2b42b1d46f0895a514ae65b421849ff0d1aaf69d0cfa219bb7bad34561394311b799a986ac3862ccd70702be8c460834bb5d5c01f1fe141902ca6b16e202a694af2b94830779df80bf4cf978a59709e9594b0d3969f7043984a11c977e65768c7406aaad2ac1029adf4aabf247827dcbad9b25095f10a1da1b74800887627c798e45509fc66 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\NextPromptBuild = "15063" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = e2034fc0fbe6d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Next Rating Prompt = 60dda2463df4d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\SplashScreen Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListInPrivateBrowsingAllowed = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = c8b92cb1fbe6d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = eb12cab1fbe6d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "268435456" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 010000008253fcdc3c2ce669144eeb6a9fe4432ae22cf2371030ef32919250801727d39d8a3547b227a627745a80401e820b277b2044064c290f86b86b9f MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
71e36a035a5dd66b5af24feb944ec65d.exepid process 3756 71e36a035a5dd66b5af24feb944ec65d.exe 3756 71e36a035a5dd66b5af24feb944ec65d.exe 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3056 -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
71e36a035a5dd66b5af24feb944ec65d.exe4033.exeMicrosoftEdgeCP.exepid process 3756 71e36a035a5dd66b5af24feb944ec65d.exe 1176 4033.exe 3912 MicrosoftEdgeCP.exe 3912 MicrosoftEdgeCP.exe 3912 MicrosoftEdgeCP.exe 3912 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7BBB.exe396C.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeDebugPrivilege 1364 7BBB.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeDebugPrivilege 3544 396C.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeRestorePrivilege 2336 WerFault.exe Token: SeBackupPrivilege 2336 WerFault.exe Token: SeDebugPrivilege 2336 WerFault.exe Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3056 1008 MicrosoftEdge.exe 3912 MicrosoftEdgeCP.exe 3912 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
71e36a035a5dd66b5af24feb944ec65d.exe34F6.exe396C.exe60FE.execmd.execmd.execmd.exedescription pid process target process PID 2752 wrote to memory of 3756 2752 71e36a035a5dd66b5af24feb944ec65d.exe 71e36a035a5dd66b5af24feb944ec65d.exe PID 2752 wrote to memory of 3756 2752 71e36a035a5dd66b5af24feb944ec65d.exe 71e36a035a5dd66b5af24feb944ec65d.exe PID 2752 wrote to memory of 3756 2752 71e36a035a5dd66b5af24feb944ec65d.exe 71e36a035a5dd66b5af24feb944ec65d.exe PID 2752 wrote to memory of 3756 2752 71e36a035a5dd66b5af24feb944ec65d.exe 71e36a035a5dd66b5af24feb944ec65d.exe PID 2752 wrote to memory of 3756 2752 71e36a035a5dd66b5af24feb944ec65d.exe 71e36a035a5dd66b5af24feb944ec65d.exe PID 2752 wrote to memory of 3756 2752 71e36a035a5dd66b5af24feb944ec65d.exe 71e36a035a5dd66b5af24feb944ec65d.exe PID 3056 wrote to memory of 2240 3056 34F6.exe PID 3056 wrote to memory of 2240 3056 34F6.exe PID 3056 wrote to memory of 2240 3056 34F6.exe PID 3056 wrote to memory of 588 3056 396C.exe PID 3056 wrote to memory of 588 3056 396C.exe PID 3056 wrote to memory of 588 3056 396C.exe PID 3056 wrote to memory of 1176 3056 4033.exe PID 3056 wrote to memory of 1176 3056 4033.exe PID 3056 wrote to memory of 1176 3056 4033.exe PID 3056 wrote to memory of 1516 3056 4630.exe PID 3056 wrote to memory of 1516 3056 4630.exe PID 3056 wrote to memory of 1516 3056 4630.exe PID 2240 wrote to memory of 2888 2240 34F6.exe 34F6.exe PID 2240 wrote to memory of 2888 2240 34F6.exe 34F6.exe PID 2240 wrote to memory of 2888 2240 34F6.exe 34F6.exe PID 2240 wrote to memory of 2888 2240 34F6.exe 34F6.exe PID 2240 wrote to memory of 2888 2240 34F6.exe 34F6.exe PID 2240 wrote to memory of 2888 2240 34F6.exe 34F6.exe PID 3056 wrote to memory of 208 3056 563E.exe PID 3056 wrote to memory of 208 3056 563E.exe PID 3056 wrote to memory of 208 3056 563E.exe PID 3056 wrote to memory of 1180 3056 regsvr32.exe PID 3056 wrote to memory of 1180 3056 regsvr32.exe PID 588 wrote to memory of 3544 588 396C.exe 396C.exe PID 588 wrote to memory of 3544 588 396C.exe 396C.exe PID 588 wrote to memory of 3544 588 396C.exe 396C.exe PID 3056 wrote to memory of 768 3056 60FE.exe PID 3056 wrote to memory of 768 3056 60FE.exe PID 3056 wrote to memory of 768 3056 60FE.exe PID 588 wrote to memory of 3544 588 396C.exe 396C.exe PID 588 wrote to memory of 3544 588 396C.exe 396C.exe PID 588 wrote to memory of 3544 588 396C.exe 396C.exe PID 588 wrote to memory of 3544 588 396C.exe 396C.exe PID 588 wrote to memory of 3544 588 396C.exe 396C.exe PID 3056 wrote to memory of 1364 3056 7BBB.exe PID 3056 wrote to memory of 1364 3056 7BBB.exe PID 768 wrote to memory of 3240 768 60FE.exe cmd.exe PID 768 wrote to memory of 3240 768 60FE.exe cmd.exe PID 768 wrote to memory of 3240 768 60FE.exe cmd.exe PID 3240 wrote to memory of 3000 3240 cmd.exe cmd.exe PID 3240 wrote to memory of 3000 3240 cmd.exe cmd.exe PID 3240 wrote to memory of 3000 3240 cmd.exe cmd.exe PID 3240 wrote to memory of 3520 3240 cmd.exe cacls.exe PID 3240 wrote to memory of 3520 3240 cmd.exe cacls.exe PID 3240 wrote to memory of 3520 3240 cmd.exe cacls.exe PID 768 wrote to memory of 3892 768 60FE.exe cmd.exe PID 768 wrote to memory of 3892 768 60FE.exe cmd.exe PID 768 wrote to memory of 3892 768 60FE.exe cmd.exe PID 3892 wrote to memory of 3264 3892 cmd.exe cacls.exe PID 3892 wrote to memory of 3264 3892 cmd.exe cacls.exe PID 3892 wrote to memory of 3264 3892 cmd.exe cacls.exe PID 768 wrote to memory of 1092 768 60FE.exe cmd.exe PID 768 wrote to memory of 1092 768 60FE.exe cmd.exe PID 768 wrote to memory of 1092 768 60FE.exe cmd.exe PID 1092 wrote to memory of 2400 1092 cmd.exe cmd.exe PID 1092 wrote to memory of 2400 1092 cmd.exe cmd.exe PID 1092 wrote to memory of 2400 1092 cmd.exe cmd.exe PID 1092 wrote to memory of 508 1092 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71e36a035a5dd66b5af24feb944ec65d.exe"C:\Users\Admin\AppData\Local\Temp\71e36a035a5dd66b5af24feb944ec65d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\71e36a035a5dd66b5af24feb944ec65d.exe"C:\Users\Admin\AppData\Local\Temp\71e36a035a5dd66b5af24feb944ec65d.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\34F6.exeC:\Users\Admin\AppData\Local\Temp\34F6.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\34F6.exeC:\Users\Admin\AppData\Local\Temp\34F6.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\396C.exeC:\Users\Admin\AppData\Local\Temp\396C.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\396C.exeC:\Users\Admin\AppData\Local\Temp\396C.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\4033.exeC:\Users\Admin\AppData\Local\Temp\4033.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4630.exeC:\Users\Admin\AppData\Local\Temp\4630.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4630.exe" & exit2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\563E.exeC:\Users\Admin\AppData\Local\Temp\563E.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5D63.dll1⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\60FE.exeC:\Users\Admin\AppData\Local\Temp\60FE.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe" /P "Admin:N"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe" /P "Admin:R" /E2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe" /P "Admin:R" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Local\Temp\6829558ede" /P "Admin:N"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Local\Temp\6829558ede" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Local\Temp\6829558ede" /P "Admin:R" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Local\Temp\6829558ede" /P "Admin:R" /E3⤵
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe"C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\6829558ede\3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\6829558ede\4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe"C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe"C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe"C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 4684⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7BBB.exeC:\Users\Admin\AppData\Local\Temp\7BBB.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\EF56.exeC:\Users\Admin\AppData\Local\Temp\EF56.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\vlkrBQnuohRvi & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\EF56.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\FA.exeC:\Users\Admin\AppData\Local\Temp\FA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping bing.com2⤵
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" bing.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping bing.com2⤵
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" bing.com3⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\FA.exeC:\Users\Admin\AppData\Local\Temp\FA.exe2⤵
- Executes dropped EXE
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exeC:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exe1⤵
- Executes dropped EXE
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\396C.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
e33ed3d4cc9b2e5a08ae25747ef47620
SHA1e2f4cfdd39bcb2eb1c05648a37a3d8536eaf19b7
SHA2560e7093450fb6bb5201b4291033daf6099881421ab47b122972e0249ef5b45a4f
SHA5129e990f7ca202c7ecc7a21dd2433055b71bd62f2e524f4702b674316effeb8fa37e891d40f3e6a960380dd7967033c7a7f235e73a3c434e97495e532309b4f95e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
75c0a70aae61aacdd2e754ac2ee8b58f
SHA1c9e2be4edf7c6a5f715d5d1e2119e6cff06efdf2
SHA2565eb75bac7eae1fa3f371e9eb7307a2c58c7645ab50c8b064313e5d6c3a209028
SHA512020c7865787b8b69a8237527e9d158611c45b8f3d6af477e54b9241e8bb6e9e57d8bde1a5b9daded4c84f1c0afc2028efbb44b95682986e4dd8fce2a9070d489
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4ZB85SR9\5cce29c0.deprecation[1].jsMD5
55bb21475c9d3a6d3c00f2c26a075e7d
SHA159696ef8addd5cfb642ad99521a8aed9420e0859
SHA2563ceddaf5a1ed02614ec6b4edd5881a3ffb7ec08116154dff8eb9897230bf5e59
SHA51235261ddaf86da82d27a29f39a7c6074a5f0e66f5b0a8098c7502289fb70b186371a7fe71410baab6cc6b726e9338afecee9f8bb075047a055723fb5e2f09b9c7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4ZB85SR9\ef0d2b81.site-ltr[1].cssMD5
f3a58210ca2787cfd0c02999548b353e
SHA17f9b0b94e2b790918db7d6d6ef4e8a52a18db12a
SHA25695a4a97ef62b85a6166712ae6a0f72ce1c9b5e3b7241ae96c45422288b984ed9
SHA512b15f93a3fd7b966c96ecc4251b21bdf114fcd800eb115e21665a3449919187698b0729d8a92f9114e79c8c9b556a9e592e50fbffabd8b0c3fbe5712d8b3f4a2c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4ZB85SR9\install-3-5[1].pngMD5
f6ec97c43480d41695065ad55a97b382
SHA1d9c3d0895a5ed1a3951b8774b519b8217f0a54c5
SHA25607a599fab1e66babc430e5fed3029f25ff3f4ea2dd0ec8968ffba71ef1872f68
SHA51222462763178409d60609761a2af734f97b35b9a818ec1fd9046afab489aad83ce34896ee8586efe402ea7739ecf088bc2db5c1c8e4fb39e6a0fc5b3adc6b4a9b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\LG51034R\MathJax[1].jsMD5
7a3737a82ea79217ebe20f896bceb623
SHA196b575bbae7dac6a442095996509b498590fbbf7
SHA256002a60f162fd4d3081f435860d408ffce6f6ef87398f75bd791cadc8dae0771d
SHA512e0d1f62bae160008e486a6f4ef8b57aa74c1945980c00deb37b083958f4291f0a47b994e5fdb348c2d4618346b93636ce4c323c6f510ab2fbd7a6547359d28d5
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\LG51034R\SegoeUI-Roman-VF_web[1].woff2MD5
bca97218dca3cb15ce0284cbcb452890
SHA1635298cbbd72b74b1762acc7dad6c79de4b3670d
SHA25663c12051016796d92bcf4bc20b4881057475e6dfa4937c29c9e16054814ab47d
SHA5126e850842d1e353a5457262c5c78d20704e8bd24b532368ba5e5dfc7a4b63059d536296b597fd3ccbd541aa8f89083a79d50aaa1b5e65b4d23fc37bfd806f0545
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\LG51034R\a4b445c1.index-docs[1].jsMD5
283bb1b069e9555b8d94cd04b19a8fa2
SHA108f8250e07bd34613177e88f6c5f289d5c291bc6
SHA256688b71e64fa4d62b34da2c02c0947ab15715391e7a22e9b913800f9b26be4826
SHA51204c0e29c3fa809215a745fdac220df97b2ccfb2a4c3f98f1215e06c82adde135cd37a4e6a3fa0bb459171b589d11604379b5caa55dec02af125cb4850028aafc
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\LG51034R\repair-tool-recommended-changes[1].pngMD5
3062488f9d119c0d79448be06ed140d8
SHA18a148951c894fc9e968d3e46589a2e978267650e
SHA256c47a383de6dd60149b37dd24825d42d83cb48be0ed094e3fc3b228d0a7bb9332
SHA51200bba6bcbfbf44b977129594a47f732809dce7d4e2d22d050338e4eea91fcc02a9b333c45eeb4c9024df076cbda0b46b621bf48309c0d037d19bbeae0367f5ed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\N0DFGAK9\12971179[1].jpgMD5
0e4994ae0e03d9611e7655286675f156
SHA1e650534844a7197b328371318f288ae081448a97
SHA25607b979b12f1cb506df7675efe227a2e78accfa1f5954af2b7bb66295e5cf881c
SHA51207aaae5347fa8e82f86d0ba7c28127fac952d84bad3dce119654b5ba1cd2550c8d064770473f34f89fc383847b2f1594b3600d9fd01e6275d67868c41638e34a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\N0DFGAK9\31348972[1].jpgMD5
c09597bbae67e58e38228f9e8fa06175
SHA185aec568955ad5d9165364d37a9a141dd899eca9
SHA256f62142fd084d46df32d9d8a340855fcb17b14376c36549b825670451ea7cae73
SHA512b7592dcf34487e3ddbffd32e8d03cb5665330f8f687e10f39f16c67673238e340cf4633b8e921932c65e3c891286349378bb70ad9a8026046653c4cf8fa2efff
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\N0DFGAK9\repair-tool-changes-complete[1].pngMD5
512625cf8f40021445d74253dc7c28c0
SHA1f6b27ce0f7d4e48e34fddca8a96337f07cffe730
SHA2561d4dcee8511d5371fec911660d6049782e12901c662b409a5c675772e9b87369
SHA512ae02319d03884d758a86c286b6f593bdffd067885d56d82eeb8215fdcb41637c7bb9109039e7fbc93ad246d030c368fb285b3161976ed485abc5a8df6df9a38c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UI792TSK\app-could-not-be-started[1].pngMD5
522037f008e03c9448ae0aaaf09e93cb
SHA18a32997eab79246beed5a37db0c92fbfb006bef2
SHA256983c35607c4fb0b529ca732be42115d3fcaac947cee9c9632f7cacdbdecaf5a7
SHA512643ec613b2e7bdbb2f61e1799c189b0e3392ea5ae10845eb0b1f1542a03569e886f4b54d5b38af10e78db49c71357108c94589474b181f6a4573b86cf2d6f0d8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UI792TSK\latest[1].woff2MD5
2835ee281b077ca8ac7285702007c894
SHA12e3d4d912aaf1c3f1f30d95c2c4fcea1b7bbc29a
SHA256e172a02b68f977a57a1690507df809db1e43130f0161961709a36dbd70b4d25f
SHA51280881c074df064795f9cc5aa187bea92f0e258bf9f6b970e61e9d50ee812913bf454cecbe7fd9e151bdaef700ce68253697f545ac56d4e7ef7ade7814a1dbc5a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UI792TSK\repair-tool-no-resolution[1].pngMD5
240c4cc15d9fd65405bb642ab81be615
SHA15a66783fe5dd932082f40811ae0769526874bfd3
SHA256030272ce6ba1beca700ec83fded9dbdc89296fbde0633a7f5943ef5831876c07
SHA512267fe31bc25944dd7b6071c2c2c271ccc188ae1f6a0d7e587dcf9198b81598da6b058d1b413f228df0cb37c8304329e808089388359651e81b5f3dec566d0ee0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\6JI9RHJ6.cookieMD5
e85edc62613090ac59454a1f958ecb6d
SHA11c10f3357b6d66efbfd2fefb625c0ad896fceacd
SHA256fa5c3664fc5a90980a91a615035d3e9d92ea0cd4d0d61fb00666d3262be27234
SHA5126bc271ea446a97f84625a8fdc0af5f5d2be64214f7f8665f74eb929de09265d8a4f8f52e8e427a03a28eb7f24e1906e79c89859eeba98f914a648559c6bcb962
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\LVO1YGMV.cookieMD5
e072d10942a2f840b8d62d902139ce56
SHA162c8cf7d3aab9381474c0b5a279988b0ba33780a
SHA256146adbe0d681350b963785cc455696112473e3e9418f51ad346960ad28a6a016
SHA5129da1f767ba2ebcc0a2906f034a7b4dba8a3cb349a802f94b6efdcd027e5a8e9ffe56df4628ad9bdd371ba0076a675a0e138b5eab2fb534b96b459316b462488b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\XV52IVAP.cookieMD5
f9ac767a8cb40f75b462e9f357a794cb
SHA149e00db298753cf9260a9b60c8fef8fdd706596d
SHA2562d49f2251ed1c45b4c19c2e9c43c066b44f4d8a9b2918a71f4939ded3279870f
SHA512a8d2253258c253b6840327760224b8446dfa2b1e6644e28cd5e5931015f9536b564343e88b4bb7cf17b3cfbd97aca57929df7d703652c6e85ef699dd72a06f7f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3MD5
674c71de70265ec963c3ba360f1b7843
SHA16142e4922b80d23cc5d9aec502e36ebb62193cfa
SHA2565349e8462611ebfc02f92c3d0741b61f595f40c75b720b1e64423247fbe031b8
SHA5124f54cc1bdac28b85aac96c0e44d859f8083ed129b82e7b20fdff094a1cf46478ef207e2d0c0a4a1c1f20c94aa2ff8ce52102744ae5659cb9e970f013c7d01c29
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1MD5
042800718d04df6208c3fed0e46f51af
SHA17b7dbf34b6aa98eefdca9adb8082f89631c5a21c
SHA25611494773e4904acb3fc43c46ca3a19ec7b18840a5181617421ccb10be0189a67
SHA5122f3036aeb266c2f5d0f31be4b0eca8e1c32e3e0650c9dee95d4856b7436834f366d6fab1cfb54e902a4fdb785957fc1ac07636a0c0c24319f18718e19330d9cb
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63MD5
9b1e9d59df95ba03c0c78e7df3a3cb27
SHA177fef32baea83bb0ae20ec54a59053304b9f18ca
SHA256eb7a7712f376222d0dd25d2c09019400cc576d3616984350e2585c5a0c3225e0
SHA5123c7c777bd366d2e6ba51776496482138ec9f85bc7c98e2ca6ed5b837b4bc030800a3a832afa2419572e5e899dbf365de12a9807a2a5ef2de5f7a2a1c701436ed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231MD5
ce5b0be4643ea131fc1bbbf941683aab
SHA1f50ec0f9dcbf8c5eb982b9ff22aafbf67095967e
SHA256746054cebe464d6ddb00e050aacf2ed35b3538be5ed0b35ed83fbd37377122d0
SHA512613145fbc87557ef157f6fca686edd36bc073d1f38e5564b3d0d6bc92c0b1386f76902b3ce1c9c5ba0211c9d9e7b966d499500ebd6dd5db7f0f47ee7ac11c54b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868MD5
5dfd2ef77b4ddef1beb141cd2cc810ce
SHA198c4aa8e6f4025673314bbbe0aa6079b95d130a9
SHA256620511f5ab29c555c4516420a13d44d98966749cb0556ebbb86e951be351a1a6
SHA512a0d4525d42477786f2ef247740e1bb84d5a2957c6a0c940b3d12772c26c5cb008d852161c0086902132595afe0f8ada4afe7cfba874b941413b6d251b5cd4bce
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04MD5
8bcb3d4dd4d04683e28ead2d7d57d7d1
SHA1bcb1891f4a821762104df026ad5fba0eb0c12b2c
SHA256448ede26c83f47444ac22bfef819ab29e7e7aeb965b0c230cab804b001ae325a
SHA512b026181ed1cd01ab29b9c8314203c11b495d2753deb6bbb95f80a872249a9da20cbff877dbc79debe5f73d6ac6029bd73cf9b20fa7c07ea6fde8678a4c19323d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3MD5
f7ff26065332313de9333287c7962899
SHA1cd08e8bcfd669dc5d97868536d00a7d4b1c7265a
SHA256c7b877279c219cfd846900ff602782e51cef1054210a41e93420d128398d19e1
SHA5126bd9c0168dd0c563ab61593164c4192f30ef99fd7d0d2d70bf798778ec490c813c73b08efd5aaf3bd28b5259bac3aeb5b9083caa18b1cf5f9a1b4ee01c4ab1a0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1MD5
6dded8ebaec371a856b7bb338f37593e
SHA16f9532d4253ac9423e62d9c323e0e77f5bbcac13
SHA256c61b6d7628713548fbee5c2fc524e823042671b10d07fcb7a8225c02838acf49
SHA51220cc50488b3b773f31c15c85ab86bdffd473e19fced21eba7a2d2ecf02afa1bf0fa5746c3390d510baa7efd66eb7e926a551fefc5fd5cae094744b17d5341262
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63MD5
75059f78959df535ee67fb6eb438f7b2
SHA140500c0f3336507b40bd08c28c8a91d1e3c972c1
SHA2569f95a2f6a8dcfb55459cf37cefeea185ee8bb4fe2d0456c4d3f2e205842fae11
SHA512443d9eeeeec6ea62a53b90cda4b9277fb6e8dedd23602a07e0ef6e322fca0a185797599e2a80889d5bd475c5d40584d23790f90dfdf5adf96380e9883be265c8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_AD319D6DA1A11BC83AC8B4E4D3638231MD5
7578df28a237e009031a5dc1d13f80d6
SHA13564f48f3c07fc4e1e74c9442757417f5eb021f8
SHA256c461608a4ef65d89d1df5fc73114fafcef215c66ef2fbaf73409cffbd441527c
SHA512afcd33dbc097ce4fd148102d63b0690370288e60212f23b1b4d514b679c342891deed0494aa07f190242871cf62872e3fe3474e3da4a4f8d9e414243f2a9926d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868MD5
b03b4e47b721970899277e1522d21dfe
SHA1036314d6cdb52322abfbb84ed28ce6d9fc20eb45
SHA2562b69466ac24c72952dc03da3f5dd8cdfbef15897ef19002acf518b4f615bc2ef
SHA5124dd982848d88a0085d21e751b6cb76bc66c317b685eb4ca860d49bf9ad5f6d55351fb494c188e4b9ab981772b754ff3a4fc08236911678cdcca602bde168e508
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04MD5
a195a9ae4432c3a38926d35876e3254f
SHA1b325806b99d63b883eeaeed2a67d3eda3045eacf
SHA256db01662ef3277ac55653a7ec218fdf2e3d7b7c13fa257db4d99576e3b63591da
SHA5125006a17cc4021ee688f8b6e95367403737636faf5bf62f50edd2ff1ed2699b5efba4a2c4f45b5674a717c9e8b1314d8af008a0d520453a74a19680b08a0bc8c1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2274612954.priMD5
0db264b38ac3c5f6c140ba120a7fe72f
SHA151aa2330c597e84ed3b0d64bf6b73bf6b15f9d74
SHA2562f6955b0f5277a7904c59e461bfa6b06c54fece0d7c11f27408fa7a281a4556d
SHA5123534c243516cef5cee0540d5efd5cde1f378e127e6013b5e309a2e0be8393417bfe458706564b4b955f92132a51e2772c67f9fd90441476cc3512a5d9f910d84
-
C:\Users\Admin\AppData\Local\Temp\03795181499162622812MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\34F6.exeMD5
71e36a035a5dd66b5af24feb944ec65d
SHA1adf7f623fc3999a00393888bd4feb9acb9072e52
SHA2562325867f4393e53af12fb842a6b406979bd6d96a8503d70fda2280b0103f56b2
SHA51210537d6a552bfd08eb46c0d7840a2ec9fd12f884d78af740fad2750e1e18dc520f2234429e80631d73270abc5ff1076c7ecbbae44a1d37e745d8691ab66490cf
-
C:\Users\Admin\AppData\Local\Temp\34F6.exeMD5
71e36a035a5dd66b5af24feb944ec65d
SHA1adf7f623fc3999a00393888bd4feb9acb9072e52
SHA2562325867f4393e53af12fb842a6b406979bd6d96a8503d70fda2280b0103f56b2
SHA51210537d6a552bfd08eb46c0d7840a2ec9fd12f884d78af740fad2750e1e18dc520f2234429e80631d73270abc5ff1076c7ecbbae44a1d37e745d8691ab66490cf
-
C:\Users\Admin\AppData\Local\Temp\34F6.exeMD5
71e36a035a5dd66b5af24feb944ec65d
SHA1adf7f623fc3999a00393888bd4feb9acb9072e52
SHA2562325867f4393e53af12fb842a6b406979bd6d96a8503d70fda2280b0103f56b2
SHA51210537d6a552bfd08eb46c0d7840a2ec9fd12f884d78af740fad2750e1e18dc520f2234429e80631d73270abc5ff1076c7ecbbae44a1d37e745d8691ab66490cf
-
C:\Users\Admin\AppData\Local\Temp\396C.exeMD5
5115e5dab211559a85cd0154e8100f53
SHA1347800b72ac53ec6e2c87e433763b20282a2c06d
SHA256ef156fb3a203fe197d89d63e2ea7805a1b9af505dfff5a58532dbfe34e7aabaa
SHA512d03e58376be1e299a6da57a28ed5db176999baded713aa54ddb59cf8c82b97e8c0b028ce07bddb6989c7c77e518e151e112dde2f1d5244ac2572e4371fa68c12
-
C:\Users\Admin\AppData\Local\Temp\396C.exeMD5
5115e5dab211559a85cd0154e8100f53
SHA1347800b72ac53ec6e2c87e433763b20282a2c06d
SHA256ef156fb3a203fe197d89d63e2ea7805a1b9af505dfff5a58532dbfe34e7aabaa
SHA512d03e58376be1e299a6da57a28ed5db176999baded713aa54ddb59cf8c82b97e8c0b028ce07bddb6989c7c77e518e151e112dde2f1d5244ac2572e4371fa68c12
-
C:\Users\Admin\AppData\Local\Temp\396C.exeMD5
5115e5dab211559a85cd0154e8100f53
SHA1347800b72ac53ec6e2c87e433763b20282a2c06d
SHA256ef156fb3a203fe197d89d63e2ea7805a1b9af505dfff5a58532dbfe34e7aabaa
SHA512d03e58376be1e299a6da57a28ed5db176999baded713aa54ddb59cf8c82b97e8c0b028ce07bddb6989c7c77e518e151e112dde2f1d5244ac2572e4371fa68c12
-
C:\Users\Admin\AppData\Local\Temp\4033.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\4033.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\4630.exeMD5
661ba24291fc637e93d62e3f1ba8442f
SHA1360e460b0f52e9a4c158ed7649956177e021053c
SHA2563e6cf5524407e7c77385b9fb5cbb08ff1a8afc5e04c71dee99ad3ccbe35846e2
SHA512391c496f1fc9a82b25c37fa1c74cff18b9144a75082ae58ee071b0bae6b5dd2bb7d72f859f5f4031d8e5080d513ac15b71ce7cdc8c387b21b1951df2c90303db
-
C:\Users\Admin\AppData\Local\Temp\4630.exeMD5
661ba24291fc637e93d62e3f1ba8442f
SHA1360e460b0f52e9a4c158ed7649956177e021053c
SHA2563e6cf5524407e7c77385b9fb5cbb08ff1a8afc5e04c71dee99ad3ccbe35846e2
SHA512391c496f1fc9a82b25c37fa1c74cff18b9144a75082ae58ee071b0bae6b5dd2bb7d72f859f5f4031d8e5080d513ac15b71ce7cdc8c387b21b1951df2c90303db
-
C:\Users\Admin\AppData\Local\Temp\563E.exeMD5
ca16ca4aa9cf9777274447c9f4ba222e
SHA11025ed93e5f44d51b96f1a788764cc4487ee477e
SHA2560016755526279c5c404b670ecb2d81af46066d879c389924a6574ab9864b5c04
SHA51272d8d2a729b8ce2940235d3a317ee3eb0eb8d1411e847d6d11e36484f520bb88b3cabd03716b3c2988b0a053426be14aace154f13d306883788f952cd03cf712
-
C:\Users\Admin\AppData\Local\Temp\563E.exeMD5
ca16ca4aa9cf9777274447c9f4ba222e
SHA11025ed93e5f44d51b96f1a788764cc4487ee477e
SHA2560016755526279c5c404b670ecb2d81af46066d879c389924a6574ab9864b5c04
SHA51272d8d2a729b8ce2940235d3a317ee3eb0eb8d1411e847d6d11e36484f520bb88b3cabd03716b3c2988b0a053426be14aace154f13d306883788f952cd03cf712
-
C:\Users\Admin\AppData\Local\Temp\5D63.dllMD5
2ee33ef3b24574c9fb54fd75e29fdf6e
SHA1158a048f5f5feac85eb5791fbb25ba6aaf262712
SHA25646e20b3931c4550ade3e4abd395a289621ea3f42f6aa44c90083ebb7f7be2704
SHA5120655a316b91070c8275afba7ab8437da66cd8b00e4ddcc58c86fa28444deb66700d19e76e93329910c7e44ef28ec488556e2026221980b6aacaa804745a56c5e
-
C:\Users\Admin\AppData\Local\Temp\60FE.exeMD5
56dfbe78d5e7f1c1156a8dae8672a3e5
SHA15ca03199a0db7465ca7fb92d2d48642f4f981d17
SHA256250298a15ca5e40170a1feb8e639b12bbd591a448ebbfe5bc7574a1532596c46
SHA512ea0fb267a6ab6b4838dc840ed7939dce72009d91f482d0c040e5a4d0b66a865e29a8b9e49b1c758b87a396453f0de7cef897aeb6bd3045f969cb68df68ae482f
-
C:\Users\Admin\AppData\Local\Temp\60FE.exeMD5
56dfbe78d5e7f1c1156a8dae8672a3e5
SHA15ca03199a0db7465ca7fb92d2d48642f4f981d17
SHA256250298a15ca5e40170a1feb8e639b12bbd591a448ebbfe5bc7574a1532596c46
SHA512ea0fb267a6ab6b4838dc840ed7939dce72009d91f482d0c040e5a4d0b66a865e29a8b9e49b1c758b87a396453f0de7cef897aeb6bd3045f969cb68df68ae482f
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exeMD5
56dfbe78d5e7f1c1156a8dae8672a3e5
SHA15ca03199a0db7465ca7fb92d2d48642f4f981d17
SHA256250298a15ca5e40170a1feb8e639b12bbd591a448ebbfe5bc7574a1532596c46
SHA512ea0fb267a6ab6b4838dc840ed7939dce72009d91f482d0c040e5a4d0b66a865e29a8b9e49b1c758b87a396453f0de7cef897aeb6bd3045f969cb68df68ae482f
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exeMD5
56dfbe78d5e7f1c1156a8dae8672a3e5
SHA15ca03199a0db7465ca7fb92d2d48642f4f981d17
SHA256250298a15ca5e40170a1feb8e639b12bbd591a448ebbfe5bc7574a1532596c46
SHA512ea0fb267a6ab6b4838dc840ed7939dce72009d91f482d0c040e5a4d0b66a865e29a8b9e49b1c758b87a396453f0de7cef897aeb6bd3045f969cb68df68ae482f
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exeMD5
56dfbe78d5e7f1c1156a8dae8672a3e5
SHA15ca03199a0db7465ca7fb92d2d48642f4f981d17
SHA256250298a15ca5e40170a1feb8e639b12bbd591a448ebbfe5bc7574a1532596c46
SHA512ea0fb267a6ab6b4838dc840ed7939dce72009d91f482d0c040e5a4d0b66a865e29a8b9e49b1c758b87a396453f0de7cef897aeb6bd3045f969cb68df68ae482f
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exeMD5
56dfbe78d5e7f1c1156a8dae8672a3e5
SHA15ca03199a0db7465ca7fb92d2d48642f4f981d17
SHA256250298a15ca5e40170a1feb8e639b12bbd591a448ebbfe5bc7574a1532596c46
SHA512ea0fb267a6ab6b4838dc840ed7939dce72009d91f482d0c040e5a4d0b66a865e29a8b9e49b1c758b87a396453f0de7cef897aeb6bd3045f969cb68df68ae482f
-
C:\Users\Admin\AppData\Local\Temp\6829558ede\tkools.exeMD5
56dfbe78d5e7f1c1156a8dae8672a3e5
SHA15ca03199a0db7465ca7fb92d2d48642f4f981d17
SHA256250298a15ca5e40170a1feb8e639b12bbd591a448ebbfe5bc7574a1532596c46
SHA512ea0fb267a6ab6b4838dc840ed7939dce72009d91f482d0c040e5a4d0b66a865e29a8b9e49b1c758b87a396453f0de7cef897aeb6bd3045f969cb68df68ae482f
-
C:\Users\Admin\AppData\Local\Temp\7BBB.exeMD5
9771ea3552ca69c2a4a29401928705c0
SHA11cfbb34d7cc4a6f9c05f9403d14f67751dc5d7c6
SHA2564d249cc72c105eed117476e473d0eea672d72bc560a4e918c91f39220e119e9b
SHA5126f73eb054aefa42ef81335f4a45ca8b9eaa3b6626f460cb93d9c062e2e85b00f76722dc32caa460d13203b896913832f70476629aa8907f7256d36fe04b706be
-
C:\Users\Admin\AppData\Local\Temp\7BBB.exeMD5
9771ea3552ca69c2a4a29401928705c0
SHA11cfbb34d7cc4a6f9c05f9403d14f67751dc5d7c6
SHA2564d249cc72c105eed117476e473d0eea672d72bc560a4e918c91f39220e119e9b
SHA5126f73eb054aefa42ef81335f4a45ca8b9eaa3b6626f460cb93d9c062e2e85b00f76722dc32caa460d13203b896913832f70476629aa8907f7256d36fe04b706be
-
C:\Users\Admin\AppData\Local\Temp\EF56.exeMD5
112ec56110d36baba5b9e1ae46e171aa
SHA150bfa9adfb24d913fc5607ac762e8a9907b1fe68
SHA25608e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3
SHA512c8d19fb284f33e6859679c31bad90828be37ea9a83577efa63033fc781a11e2a5bf3d76f07bf6192c014795f968997dad0d68aac13f88403a7cfc21a0abb3abd
-
C:\Users\Admin\AppData\Local\Temp\EF56.exeMD5
112ec56110d36baba5b9e1ae46e171aa
SHA150bfa9adfb24d913fc5607ac762e8a9907b1fe68
SHA25608e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3
SHA512c8d19fb284f33e6859679c31bad90828be37ea9a83577efa63033fc781a11e2a5bf3d76f07bf6192c014795f968997dad0d68aac13f88403a7cfc21a0abb3abd
-
C:\Users\Admin\AppData\Local\Temp\FA.exeMD5
b06e5915f19fd4ce3a5cf75026b33183
SHA1b3472f230aa2490b806b6640ce8610840fa4f18e
SHA2567a158f5877f706a75d42d6a96ae36b96cd1134a9396721eafbb43f51842c3bc3
SHA512b6689885d9f3c79e385de622b288991d00237b53d69133fd8247a74f58d39aef50672bfee0ffd02ddaa978359665e52b07af5763bc03ae88871a5f9c3ba953fe
-
C:\Users\Admin\AppData\Local\Temp\FA.exeMD5
b06e5915f19fd4ce3a5cf75026b33183
SHA1b3472f230aa2490b806b6640ce8610840fa4f18e
SHA2567a158f5877f706a75d42d6a96ae36b96cd1134a9396721eafbb43f51842c3bc3
SHA512b6689885d9f3c79e385de622b288991d00237b53d69133fd8247a74f58d39aef50672bfee0ffd02ddaa978359665e52b07af5763bc03ae88871a5f9c3ba953fe
-
C:\Users\Admin\AppData\Local\Temp\FA.exeMD5
b06e5915f19fd4ce3a5cf75026b33183
SHA1b3472f230aa2490b806b6640ce8610840fa4f18e
SHA2567a158f5877f706a75d42d6a96ae36b96cd1134a9396721eafbb43f51842c3bc3
SHA512b6689885d9f3c79e385de622b288991d00237b53d69133fd8247a74f58d39aef50672bfee0ffd02ddaa978359665e52b07af5763bc03ae88871a5f9c3ba953fe
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
\Users\Admin\AppData\Local\Temp\5D63.dllMD5
2ee33ef3b24574c9fb54fd75e29fdf6e
SHA1158a048f5f5feac85eb5791fbb25ba6aaf262712
SHA25646e20b3931c4550ade3e4abd395a289621ea3f42f6aa44c90083ebb7f7be2704
SHA5120655a316b91070c8275afba7ab8437da66cd8b00e4ddcc58c86fa28444deb66700d19e76e93329910c7e44ef28ec488556e2026221980b6aacaa804745a56c5e
-
memory/208-142-0x0000000000000000-mapping.dmp
-
memory/208-150-0x00000000771D0000-0x000000007735E000-memory.dmpFilesize
1.6MB
-
memory/208-152-0x0000000001380000-0x0000000001A62000-memory.dmpFilesize
6.9MB
-
memory/208-153-0x0000000001380000-0x0000000001A62000-memory.dmpFilesize
6.9MB
-
memory/208-154-0x0000000001380000-0x0000000001A62000-memory.dmpFilesize
6.9MB
-
memory/208-155-0x0000000001380000-0x0000000001A62000-memory.dmpFilesize
6.9MB
-
memory/400-266-0x0000000007E60000-0x0000000007E61000-memory.dmpFilesize
4KB
-
memory/400-256-0x0000000003250000-0x0000000003251000-memory.dmpFilesize
4KB
-
memory/400-287-0x0000000006FB4000-0x0000000006FB6000-memory.dmpFilesize
8KB
-
memory/400-286-0x0000000006FB3000-0x0000000006FB4000-memory.dmpFilesize
4KB
-
memory/400-254-0x0000000000000000-mapping.dmp
-
memory/400-255-0x0000000003250000-0x0000000003251000-memory.dmpFilesize
4KB
-
memory/400-259-0x0000000006FB0000-0x0000000006FB1000-memory.dmpFilesize
4KB
-
memory/400-262-0x0000000007C50000-0x0000000007C51000-memory.dmpFilesize
4KB
-
memory/400-257-0x0000000006EF0000-0x0000000006EF1000-memory.dmpFilesize
4KB
-
memory/400-258-0x00000000075F0000-0x00000000075F1000-memory.dmpFilesize
4KB
-
memory/400-260-0x0000000006FB2000-0x0000000006FB3000-memory.dmpFilesize
4KB
-
memory/400-265-0x0000000008040000-0x0000000008041000-memory.dmpFilesize
4KB
-
memory/400-263-0x0000000007CF0000-0x0000000007CF1000-memory.dmpFilesize
4KB
-
memory/508-197-0x0000000000000000-mapping.dmp
-
memory/588-139-0x0000000000600000-0x0000000000601000-memory.dmpFilesize
4KB
-
memory/588-141-0x0000000004E30000-0x0000000004E31000-memory.dmpFilesize
4KB
-
memory/588-147-0x0000000004FD0000-0x0000000004FD1000-memory.dmpFilesize
4KB
-
memory/588-123-0x0000000000000000-mapping.dmp
-
memory/588-146-0x0000000004DD0000-0x0000000004DD1000-memory.dmpFilesize
4KB
-
memory/588-159-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/768-182-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/768-181-0x00000000004E0000-0x000000000062A000-memory.dmpFilesize
1.3MB
-
memory/768-160-0x0000000000000000-mapping.dmp
-
memory/1008-200-0x0000000000000000-mapping.dmp
-
memory/1092-195-0x0000000000000000-mapping.dmp
-
memory/1128-217-0x0000000000000000-mapping.dmp
-
memory/1176-290-0x0000000000000000-mapping.dmp
-
memory/1176-130-0x0000000002B70000-0x0000000002C1E000-memory.dmpFilesize
696KB
-
memory/1176-138-0x0000000000400000-0x0000000002B64000-memory.dmpFilesize
39.4MB
-
memory/1176-126-0x0000000000000000-mapping.dmp
-
memory/1176-129-0x0000000002B70000-0x0000000002C1E000-memory.dmpFilesize
696KB
-
memory/1180-156-0x0000000000000000-mapping.dmp
-
memory/1180-261-0x0000000000CE0000-0x0000000000D43000-memory.dmpFilesize
396KB
-
memory/1228-244-0x0000000000000000-mapping.dmp
-
memory/1268-201-0x0000000000000000-mapping.dmp
-
memory/1364-234-0x000000001D940000-0x000000001D941000-memory.dmpFilesize
4KB
-
memory/1364-184-0x00000000008B0000-0x00000000008B1000-memory.dmpFilesize
4KB
-
memory/1364-177-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/1364-186-0x000000001CF70000-0x000000001CF71000-memory.dmpFilesize
4KB
-
memory/1364-233-0x000000001AC00000-0x000000001AC01000-memory.dmpFilesize
4KB
-
memory/1364-193-0x000000001CEC0000-0x000000001CEC1000-memory.dmpFilesize
4KB
-
memory/1364-235-0x000000001E320000-0x000000001E321000-memory.dmpFilesize
4KB
-
memory/1364-212-0x000000001CE80000-0x000000001CE81000-memory.dmpFilesize
4KB
-
memory/1364-191-0x000000001CE60000-0x000000001CE61000-memory.dmpFilesize
4KB
-
memory/1364-180-0x00000000008A0000-0x00000000008A2000-memory.dmpFilesize
8KB
-
memory/1364-174-0x0000000000000000-mapping.dmp
-
memory/1364-183-0x0000000000860000-0x0000000000898000-memory.dmpFilesize
224KB
-
memory/1364-211-0x000000001D100000-0x000000001D101000-memory.dmpFilesize
4KB
-
memory/1516-131-0x0000000000000000-mapping.dmp
-
memory/1516-145-0x00000000007B1000-0x00000000007C5000-memory.dmpFilesize
80KB
-
memory/1516-148-0x00000000001C0000-0x00000000001E1000-memory.dmpFilesize
132KB
-
memory/1516-149-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2212-248-0x0000000000B70000-0x0000000000B71000-memory.dmpFilesize
4KB
-
memory/2212-245-0x0000000000000000-mapping.dmp
-
memory/2212-252-0x0000000005550000-0x0000000005551000-memory.dmpFilesize
4KB
-
memory/2212-253-0x0000000005420000-0x0000000005421000-memory.dmpFilesize
4KB
-
memory/2212-304-0x0000000005553000-0x0000000005555000-memory.dmpFilesize
8KB
-
memory/2240-134-0x00000000007C1000-0x00000000007D2000-memory.dmpFilesize
68KB
-
memory/2240-120-0x0000000000000000-mapping.dmp
-
memory/2400-196-0x0000000000000000-mapping.dmp
-
memory/2412-240-0x0000000000D60000-0x00000000014A2000-memory.dmpFilesize
7.3MB
-
memory/2412-236-0x0000000000000000-mapping.dmp
-
memory/2412-239-0x0000000000D60000-0x00000000014A2000-memory.dmpFilesize
7.3MB
-
memory/2412-241-0x00000000771D0000-0x000000007735E000-memory.dmpFilesize
1.6MB
-
memory/2412-243-0x0000000000D60000-0x00000000014A2000-memory.dmpFilesize
7.3MB
-
memory/2412-242-0x0000000000D60000-0x00000000014A2000-memory.dmpFilesize
7.3MB
-
memory/2752-115-0x0000000000761000-0x0000000000772000-memory.dmpFilesize
68KB
-
memory/2752-116-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/2768-222-0x00000000004F9EAE-mapping.dmp
-
memory/2768-221-0x0000000000400000-0x00000000004FE000-memory.dmpFilesize
1016KB
-
memory/2888-136-0x0000000000402F47-mapping.dmp
-
memory/2964-228-0x0000000000400000-0x0000000000536000-memory.dmpFilesize
1.2MB
-
memory/2964-229-0x000000000051E000-mapping.dmp
-
memory/2964-232-0x0000000000400000-0x0000000000536000-memory.dmpFilesize
1.2MB
-
memory/3000-187-0x0000000000000000-mapping.dmp
-
memory/3056-151-0x0000000002BD0000-0x0000000002BE6000-memory.dmpFilesize
88KB
-
memory/3056-119-0x00000000007A0000-0x00000000007B6000-memory.dmpFilesize
88KB
-
memory/3240-185-0x0000000000000000-mapping.dmp
-
memory/3264-271-0x0000000000000000-mapping.dmp
-
memory/3264-294-0x0000000007234000-0x0000000007236000-memory.dmpFilesize
8KB
-
memory/3264-293-0x0000000007233000-0x0000000007234000-memory.dmpFilesize
4KB
-
memory/3264-289-0x0000000007232000-0x0000000007233000-memory.dmpFilesize
4KB
-
memory/3264-288-0x0000000007230000-0x0000000007231000-memory.dmpFilesize
4KB
-
memory/3264-194-0x0000000000000000-mapping.dmp
-
memory/3316-225-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3316-226-0x00000000004014DD-mapping.dmp
-
memory/3316-231-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3328-210-0x0000000000000000-mapping.dmp
-
memory/3520-188-0x0000000000000000-mapping.dmp
-
memory/3544-169-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB
-
memory/3544-173-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/3544-172-0x0000000004EC0000-0x00000000054C6000-memory.dmpFilesize
6.0MB
-
memory/3544-206-0x0000000005430000-0x0000000005431000-memory.dmpFilesize
4KB
-
memory/3544-163-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3544-164-0x0000000000418EE6-mapping.dmp
-
memory/3544-168-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/3544-170-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/3544-223-0x00000000070C0000-0x00000000070C1000-memory.dmpFilesize
4KB
-
memory/3544-220-0x00000000069C0000-0x00000000069C1000-memory.dmpFilesize
4KB
-
memory/3544-208-0x0000000005EA0000-0x0000000005EA1000-memory.dmpFilesize
4KB
-
memory/3544-171-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/3756-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3756-118-0x0000000000402F47-mapping.dmp
-
memory/3824-215-0x00000000001C0000-0x00000000001F9000-memory.dmpFilesize
228KB
-
memory/3824-213-0x0000000000881000-0x00000000008A0000-memory.dmpFilesize
124KB
-
memory/3824-216-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/3824-202-0x0000000000000000-mapping.dmp
-
memory/3852-218-0x0000000000000000-mapping.dmp
-
memory/3892-192-0x0000000000000000-mapping.dmp
-
memory/3988-269-0x0000000000000000-mapping.dmp
-
memory/4004-219-0x0000000000000000-mapping.dmp
-
memory/4028-209-0x0000000000000000-mapping.dmp
-
memory/4604-310-0x000000000043F176-mapping.dmp
-
memory/4604-331-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/4956-333-0x00000000004E0000-0x000000000058E000-memory.dmpFilesize
696KB
-
memory/4956-334-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB