Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 15:51
Static task
static1
Behavioral task
behavioral1
Sample
Virus_Destructive.exe
Resource
win10-en-20211208
General
-
Target
Virus_Destructive.exe
-
Size
249KB
-
MD5
1241c7fa483e828693d121d6933ccc19
-
SHA1
d766b6a14c9476aad4fb994fa06a24265f1eb24b
-
SHA256
4a132f5fca3763d8328c66ae447ac331e5bede35a63b6cac8bd845a3504d5bbb
-
SHA512
febb9519e5c63ea50d673c26a98fa675378c1d9205bd9bc878aeb3e0130c2cd877ad922df4a2c7dcea7a9815b6fae83becb896e38f59f3d7a7edf0e161cd28ff
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\f[3].txt
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 4248 created 3692 4248 WerFault.exe MicrosoftEdgeCP.exe PID 5884 created 5636 5884 WerFault.exe MicrosoftEdgeCP.exe -
Disables Task Manager via registry modification
-
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4252 takeown.exe 4348 icacls.exe 4384 takeown.exe 736 icacls.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Virus_Destructive.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\International\Geo\Nation Virus_Destructive.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4252 takeown.exe 4348 icacls.exe 4384 takeown.exe 736 icacls.exe -
Drops file in Windows directory 13 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4248 3692 WerFault.exe MicrosoftEdgeCP.exe 5884 5636 WerFault.exe MicrosoftEdgeCP.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
WerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "102" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\AllComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 4b4079762211d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.google.com\ = "862" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\google.com\Total = "96" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersion = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 1ebdc8e246ecd701 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B72164C8 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.google.com\ = "18" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.google.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\google.com\Total = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\google.com\Total = "84" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\TypedUrlsComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\google.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 254d72702211d801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.google.com\ = "874" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\google.com MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 4a883e862211d801 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\google.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 0b42057e2211d801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.google.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.google.com\ = "856" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.google.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "887" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\google.com\Total = "6" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\google.com\Total = "102" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.google.com\ = "90" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.google.com MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
Processes:
WerFault.exeWerFault.exepid process 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 4248 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe 5884 WerFault.exe -
Suspicious behavior: MapViewOfSection 22 IoCs
Processes:
MicrosoftEdgeCP.exepid process 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
Virus_Destructive.exetakeown.exetakeown.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3436 Virus_Destructive.exe Token: SeDebugPrivilege 3436 Virus_Destructive.exe Token: SeTakeOwnershipPrivilege 4252 takeown.exe Token: SeTakeOwnershipPrivilege 4384 takeown.exe Token: SeDebugPrivilege 412 MicrosoftEdge.exe Token: SeDebugPrivilege 412 MicrosoftEdge.exe Token: SeDebugPrivilege 412 MicrosoftEdge.exe Token: SeDebugPrivilege 412 MicrosoftEdge.exe Token: SeDebugPrivilege 3244 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3244 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3244 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3244 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1448 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 1448 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 736 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 736 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 736 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 736 MicrosoftEdgeCP.exe Token: SeShutdownPrivilege 736 MicrosoftEdgeCP.exe Token: SeCreatePagefilePrivilege 736 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4248 WerFault.exe Token: SeDebugPrivilege 5884 WerFault.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 412 MicrosoftEdge.exe 2800 MicrosoftEdgeCP.exe 2800 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Virus_Destructive.execmd.exeMicrosoftEdgeCP.exedescription pid process target process PID 3436 wrote to memory of 4300 3436 Virus_Destructive.exe cmd.exe PID 3436 wrote to memory of 4300 3436 Virus_Destructive.exe cmd.exe PID 4300 wrote to memory of 4252 4300 cmd.exe takeown.exe PID 4300 wrote to memory of 4252 4300 cmd.exe takeown.exe PID 4300 wrote to memory of 4348 4300 cmd.exe icacls.exe PID 4300 wrote to memory of 4348 4300 cmd.exe icacls.exe PID 4300 wrote to memory of 4384 4300 cmd.exe takeown.exe PID 4300 wrote to memory of 4384 4300 cmd.exe takeown.exe PID 4300 wrote to memory of 736 4300 cmd.exe icacls.exe PID 4300 wrote to memory of 736 4300 cmd.exe icacls.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3244 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 2952 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 3180 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2800 wrote to memory of 736 2800 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Virus_Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Virus_Destructive.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k color 47 && takeown /f C:\Windows\System32 && icacls C:\Windows\System32 /grant %username%:F && takeown /f C:\Windows\System32\drivers && icacls C:\Windows\System32\drivers /grant %username%:F && Exit2⤵
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System323⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4252 -
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4348 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\drivers3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4384 -
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\drivers /grant Admin:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:736
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:412
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3268
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4508
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2952
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3180
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:736
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1436
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:3692 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3692 -s 37482⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3672
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:5248
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5636 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5636 -s 33362⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\ee4389c6bcb04c9f990b95e842bd7b8a /t 3516 /p 34361⤵PID:5844
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5952
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:4092
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:3944
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\cb=gapi[1].jsMD5
8b3232497b1f7d6ef9de09de2d9d2ba2
SHA171ceeb9891350f713b6a65d6b024255fad6532ce
SHA25676c5142121c196c5c9f0ad23751d0006a854646200acbf3adc62faffd06e65b4
SHA512fceb36a45a0353af0b1d5189a652e515850fda007a0c482cb36f75da393eb807a08c32e39dbc0218ca903443a14743d1e213d9fbed2c250e288b818ed8064922
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\desktop_searchbox_sprites318_hr[1].pngMD5
03e471800affd719388000aa2356de1f
SHA142e718342bd7f6edf4899e161a77452dcbac68f5
SHA256bc23b3b207e8fa55b0c65a00f3fed491fa9eb5b1b39d159e7c4921bd331135ec
SHA512bfa4329d35568f4f50ac2b05917aecb4ad3a4a69f8b7248e6d39cea94f90c231b022c705ed1255f930271db2bf5286f4b24be6756a61e928b0d0723747d40081
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\images[1].jpgMD5
4f08a761f08a72ccd5be56dd6906f9f1
SHA132a16c748e4687866622c5f376f04a1628cc96eb
SHA2565b02a53b8890c63144481823766f205744cdcaa410d6d4f5f3579b2bacc05de2
SHA512566910926357e1ab67ffbbb0dd471e90833e9d83f6a7af3ab7c85d5c2e68f08135a5952be23eba05fd5885d4cf3fce72b778300d73b3e510f53876eb38420d5f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\images[2].jpgMD5
769be6152a17aa52cf458529cb0e4ba6
SHA161a013b657769c3a06fdb9af4c4fb618d5be801a
SHA256da26a6ecb7f2ceefe4f2aa1f3352ef2281c4ace94d2148a3ba31ad0c1ed7e188
SHA512cda7893a659132e5ef85b932579be50be7d2365c29fb33ecbe05d2f952c1d50569adadd380c8ee9a883c39329bb9bad323e98612001409da51e29a281ad39ce6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\loading_24[1].gifMD5
6bcd2c5891a5e617898ff487df0d2082
SHA1a2242a3f396f1feaf7aeabd40b48122d070f125a
SHA256018716003ea7214d7f973b17997aceb69cafee5c09c96c23851af2d291522ed7
SHA512a5e78f13a46f88779d91bf6683db4963d77aa3e0d73cb700468fc0291d60ee8dfd30e8cc2a81ef38a8e6373bb3a7144cf1b4b5baa5269555957b79d69929cde0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\m=COQbmf,DPreE,EufiNb,KG2eXe,LEikZe,Mbif2,OmgaI,PQaYAf,U0aPgd,aurFic,blwjVc,byfTOb,exgaYe,fKUV3e,lPKSwe,lfpdyf,lsjVmc,nabPbb,qcH9Lc,sgY6Zb[1].jsMD5
ecd8f1178eb9af29de42e3067078632b
SHA1cfa6d380e38974320cd7ecdffd39e04c073ba391
SHA256aa0ca865d38bf6d5dd1090b1a50196d67134482d14ac152afa06814fe4bd94be
SHA5123e3339d2c81e3530774e1be99992d8b6b0616ca355deb96ede2c0effba4396d5d7f6e41fb37e48cba289d863d0b704a5a29dceb543aa8920eb5879c58e29aa9e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\m=EkevXb,GU4Gab,L1AAkb,aa,abd,async,bgd,dvl,fKZehd,fiAufb,foot,kQvlef,kyn,lli,mu,sYEX8b,sb_wiz,sf,tl,w4UyN[1].jsMD5
3f352e279979ec8a40c441182fbf92c4
SHA108a5c74518b76acebd78cdc085f6576eb9f17774
SHA25658d6e7ce7c66690d0aa8f2a605bf64b4f1616f66f71fbb6e2a5e146c947d8832
SHA5127822efd8111e6be5c136559120e0a9b7cfc021f0f58a75bd2aa5e81c998510244eac6f4bdfab938b8e7f39f77596b26107973057c1f580aa0deb2aa7607eec41
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\m=Eox39d,HYSCof,JKoKVe,Tia57b,TtcOte,ZgGg9b,kHVSUb,pHXghd,tIj4fb,wPVhqc,zbML3c[1].jsMD5
6121e2bccc392262c95586f175764746
SHA1f6cbc6d34a776c493071edd0ebd596b20338450e
SHA25612e75e08ed14ccf206d1723e071854cb9fe4d86e380abb505cffa7ccc73e8c05
SHA512eeadd72b568cf208cc4ac10f67f8e0570585213bf7af2a839bdf21894a4b833e835d30d4d19fdb263909855fc465b32e4bd45163fc287402f7a98c3e47af0b22
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\search[1].htmMD5
19b92f09a12129efb544a51352647a0d
SHA1200390addb0f9cad9b863c7bda3001a3941311f3
SHA2569c71150a976d34bae3ebbcdd1c99ef42525f9195e84448e0daec229e15957984
SHA512d5f71992213ebc745ddfe245d4edb7850a2403596dea02711549248ce316526d0e427675950aaa3245306a2b33e34920da58698a77a6c0f979aa580a71289dbd
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\search[2].htmMD5
856b69df969a46987358d3efb5d08bc3
SHA17dc7d6e9046b3a945965932b5289252b7a24a900
SHA256dae5b326fbb8fed19d327536b10c2f91490ffdfc2581b7e20498fc56833e7a65
SHA5121fa10a39425723619b07160c3be5cf562136d87741d8d708b7371011645a6b543adb9a088e67746734759ff0f6e3eea2eb8e2c766c230d239572a7233eb848d0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2ZFYN8WC\xhsXU0guuD_DJQfM3yOamG_r6Q35zwg2XWY6fSAgpNU[1].jsMD5
189fbf49d4711592a7b414306d210efe
SHA1117715056cc33eb01888720b7d1c6cae49c618ab
SHA256c61b1753482eb83fc32507ccdf239a986febe90df9cf08365d663a7d2020a4d5
SHA51273be6892b22ae1f0e1f794eb021e8852ec9b05046f4db6555c359b409a46e39b7c9440351b687a56632f36a0b0cf00100434f121402d6967036f052357a4cbd5
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DDFXMGF0\intersection-observer.min[1].jsMD5
936a7c8159737df8dce532f9ea4d38b4
SHA18834ea22eff1bdfd35d2ef3f76d0e552e75e83c5
SHA2563ea95af77e18116ed0e8b52bb2c0794d1259150671e02994ac2a8845bd1ad5b9
SHA51254471260a278d5e740782524392249427366c56b288c302c73d643a24c96d99a487507fbe1c47e050a52144713dfeb64cd37bc6359f443ce5f8feb1a2856a70a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DDFXMGF0\m=ANyn1,Bpl55c,DFfvp,EkevXb,GU4Gab,GjAMtf,K6HGfd,L1AAkb,MeIiV,O6Iu7d,aLUfP,aa,abd,async,bgd,dvl,fKZehd,fiAufb,foot,kQvlef,kyn,lli,mu,pgCXq[1].jsMD5
64e6b383b9f9a6736cbce9742f513455
SHA16e311098ec43b2cbc924e1ae6a26f3e91ca9cfbf
SHA256d00f2cdfe8cb3c0984d8a6fe2cb3ce0e5a41ae49698c70f5e8e4160b7d2ef3ac
SHA51268c2d77fba2c4b26d4cca10e9ccb945d5d50198e9156283b06ad705ac2fecd05e4df188da4289efc3bb0e420a4907bfc797956462431870d4b58178e376fe0e5
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DDFXMGF0\m=CnSW2d,TSZEqd,dBuwMe,ggQ0Zb,i9SNBf,vvvZqd,yuKjYb[1].jsMD5
3c68b2526987e72424e77e586369c2aa
SHA115695c0a38a88fb580fdcbda3c9aaf844a94f48f
SHA256589ae62ffb93cec875381b5915f947e232c7b738478fb2f23806d11706a481ac
SHA512869e20c965cd39bfaf6ebf45c016dd5f3f8e75f356d78fc9e289f0b7676bfd8f8074b6b69c5391ea48673046621328dc354bad84f9d7b22cecc46db05bc0d843
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DDFXMGF0\m=CnSW2d,i9SNBf[1].jsMD5
4f4b2790bbd56b2e7a12a77fda6a8737
SHA14d44d6138d7751225de24303ac8645d24bddc0bb
SHA256f143de6e647f9f530086e16ef7505b8e11c9f85996cea24c67178e1732d54879
SHA5122e27d4cc6a46efacb4447031a050e1b72590c7fa007725d0a7868c4fb16fde84cbf733e32c065e777d0f4a07ed0d8e43de236449c504648bc09a26d7a7607ae6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DDFXMGF0\nav_logo321[1].pngMD5
4d2f68461740aa8ae4e67a41ab12868c
SHA1959355e1e8af30b057f14f69b805137fd6d09b68
SHA2560bf79837e497e65a5c9c06acaa489686f035db0f38ecde4cfa6cc99285da8191
SHA512c9a208f9da6a4184ca50b2e0639ee31b6573d8893ea80c6422656a8a28e30df86fc3ea55302ba0d8db2d586615c3ee25944b3e2bfeb43dbca9e033e3e88959d4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DDFXMGF0\rs=AA2YrTu_wErVoK98l6k9mqG95Q0W0Qs0PA[1].cssMD5
271235968f99221e38ca50bb4eaa0d76
SHA164b1da1d0fc66668ff69a5e0a733e9bbccfe5c4d
SHA256dc02dd88325f52ef8f758625d6f8a2ff3f12d6d150c49cecaf6e9a944746fd07
SHA512775129730310c5e507ddf63047bd50669cf04f1ba81493beeb6d255f6cf85162f8c5b2d978a793fbfb6eb279298bc9711532e50b27d0db6307c31cefb82b21e5
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DDFXMGF0\web-animations-next-lite.min[1].jsMD5
1a37f56b5857a2110cefd51f2fd0adfe
SHA100adcf9cb2dbad46947050198463b446c984015b
SHA25633969309a95931dc4ee07ece3d6746506f75b47ef8195507f27b75dd809c8976
SHA512070b5f8acef594b4501d3dd0224c154db34fe889c21add7a9e6230b95a1d8db38002163eab99ef3f41c7ee214337280762995a51bcafc004f88844ca3d26f27a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DDFXMGF0\webcomponents-ce-sd[1].jsMD5
8625d1d840ac71cb9f3d80be629b02b2
SHA180f9fda2efe965ddb0093e962bd33bd95774f984
SHA256c4ff16b5d28dfe3a99707d778baba98271fe51203bbc9b2a96b8328d86c4bda1
SHA5120767c8ad5388b98ffa68e58f8e8eafa067325ae9ef68e3a7da05d10a71357d470fb43ec1e86df06837002720de2dba634c91ef916f9fd7c32674124b4642c1e8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\dark_thumbnail2[1].pngMD5
ed502f6cde174c961915b1ab662ccd20
SHA198a407f3d5dff8501bf9e4688cc444731c2c2d4a
SHA256201e42686a8ad62b072191af0d74fbf820219f099e3bddbc7cc7eb494d6d62ef
SHA51259e8e0ff9e59a8006a1d8e621b3ed2556df0f013e48855f7e6ca25b4518b299a59da4fa33f3dcb770e11e45c54c8c30111e00c4f157ec4909f1444578c79d63a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\device_default_thumbnail2[1].pngMD5
a31150625cae4ce766b5b9deccdbb0da
SHA1aacd35c1c8f406a5a36d4b0633200924ca9ec1d3
SHA25621aadca3b6952f73cbf7414520d09f8ea954685655752325809fa909cf324524
SHA51203140e302b068f86c22aed2631d46e3b2bbe52e193f76cdb8a40d7533e8bb5f7c6b40eea355fd111039ed961b6ace81529939eb8d5da7b68ecfa3e8e1e7afd62
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\googlelogo_color_92x30dp[1].pngMD5
0877987d1be23418318d595a3a297ce9
SHA1f69e2644e31165bd95311c2ef6d563cfeb1bcc13
SHA256fd4d9d732e7a4af52746ebabe6bb16941ee71ae3e919131af700cf4e1228a16a
SHA512780b8db5e9fb5f27ae8e8aff5fe710f2bdab37692e8af19e1f76ca169ede7d988db49cedec92c0fff83a89b1539a2a7c2f6922a7e15979bdfb035f9f1f910641
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\light_thumbnail2[1].pngMD5
edd6cc5dc6a09bc3e9dbe931ccb4db69
SHA184a9d70a244a93457b4e3a4e2ec242e03ebd7583
SHA256a8bfd1e369fb34e050e166f781ba9b9bfb20353932fd32c1889807d3e25e2b5e
SHA5121ed927bcc634f600969725f7e2526ca3a7770be469e7ab56a031e3bc39273da8cc39020999929631dad8c081b28e0047b17acaf84ed4af3d8489c6fff91b7cf3
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\m=COQbmf,DPreE,EufiNb,KG2eXe,LEikZe,Mbif2,OmgaI,PQaYAf,U0aPgd,aurFic,blwjVc,byfTOb,exgaYe,fKUV3e,lPKSwe,lfpdyf,lsjVmc,nabPbb,qcH9Lc,sgY6Zb[1].jsMD5
254298aba8bf53ce27b8102772a19d82
SHA1007e0236bf4e613088230fa70c1161a0f862a00a
SHA25625d7e22bf6d9a9eec62a498937425c24ee193855c5905100a3d56d36e865600e
SHA512fb1b7ad210d116b0c4446a3ca542ba44fd682bf3dacb3b76bad8d3d3bbff4e2e7474c307fdf926a3c071c85173deaf86963b74f320105199cb3926d90db7ce2e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\m=EAZJjb,GGTOgd,VD4Qme,XVaCB[1].jsMD5
9abcc8a5611e8d94518ea8adfbba71a6
SHA11c82a8c20bed353097e6da550ba12442b79153ab
SHA256c70ffada606137edc4e58f827447d9bbd79979d0221e0ed8b94593e36ab4d34e
SHA5127e53176c8bb7b05dfc6abb2590716b2fc731d4a65768bb9b0c9812724efd9cd1ae6077bd25da7f7a97064447de2123f5f211ed18eb2a6d26e9fa864a0aed6153
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\rs=AA2YrTvxIxBuWtAIKOA5N8P3pOjUMiMvmw[1].jsMD5
58b284ae04c7219b87abeb16a25cf467
SHA1189380325539d41637ed2a45deb06ad4d9ef99df
SHA25675f0a6c15ccfec85b91bb2b4a8c915e406b35687c360d3e3c7d0fc927095b3e5
SHA5121e9a9b440cb07008375dce7eaba8231b1777c5a1253e6f815ab7d74f786384763666296f2f0eee9642c783faf9691ff1fe2fd93c73e582bb385dce8f0e83016a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\search[1].htmMD5
e5e9db67ecee522f7f97d79f0b68dee8
SHA1f161ad40cd6bf8ee220fb572e4fdbf587457c7d3
SHA256fcdb473166625df6bbb23bedfdec622a73df15b322eb1128c2c0231ca249a139
SHA512774d5ab89f7952437543e15f7f99dcf13e5152e97e300507e2b2483f65a581a58c3bf692f397db0cb62dcef7a7bcc209b0ac98acdf6a72eab6a0c9e2752203f0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FBIJTPX0\www-i18n-constants[1].jsMD5
258fd075ed2a7452d38ab1aea0214893
SHA1c7b481248412c3e8f8affa969496ce04fa93bae0
SHA256c6995402fbda7ebc9a95c5f8ebf8389cc017f8e80109061c9137dda12b423e77
SHA512af67aec1a87e0d5b14582595d45dc1ecd0a77562306958d0dfc1bc199d4b4c6fd26c8a067370ec1f767efd548bbff77eb1a96ea064a4add3bebafcf688f4fba5
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UNKWO90C\images[1].jpgMD5
9594dfa15d66abfb90a9b1e522ac1cea
SHA13bef95033b135cf277b48b48648523ae60298742
SHA256ab32f4b4e0f541f1af516586f7b399e4e9e048660e5b2de47dcee652b1f47acb
SHA512a4dd51bbbec5b51d825adbc21d31930b6d0e7107c9dd84ce3343c659261a70bd15970475a96927d67293592ddd5e611bafecfd9f1164d864c99191daf51bddb1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UNKWO90C\m=CCowhf,Eox39d,GJsXUb,HYSCof,ILbBec,JKoKVe,Tia57b,TtcOte,ZgGg9b,d2p3q,jWdabd,kHVSUb,pHXghd,tIj4fb,wPVhqc,zbML3c[1].jsMD5
c281e6d3632cda97e6c1c384412b2ce0
SHA1d71ee567d43768c673b7ade524d6fdaea86ba6c0
SHA256dd0c6500ee615faedbdc7cd89b323aef52a7ed50dc549a0ca30623b09c9edfda
SHA51228095bdad8af063ae3f76832716af98adf96501daed2a1a41047b92f7bcec60f6494d9c13ecdbd7218971f9992193ea9e60442647062c938c6f0322d0a03de0c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UNKWO90C\m=GGTOgd,VD4Qme,XVaCB[1].jsMD5
0c618d79c7ba9b1e3124e553f74ae4a6
SHA1967caa01dea300a5d85b4acc8f390ac886bdef53
SHA25645d70ac3619b883453f50a8b2c74e60db2e7d7dd1fb1df07c05c3435b2a68a9d
SHA512abd6f2d09d62e34067de2cf3967a762c3978776701db6fcbea1e85590a1d26885235bdefae7d35b4031aab1917d4c5e1a40ef9f146282d9cab98a9613d5644aa
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UNKWO90C\m=aLUfP[1].jsMD5
f7b735d64ef7dd15003a0f03ff5675d6
SHA17961563db1c5c9fecd6b9c37ca8254413a08b7de
SHA2567ad761f24b4eb1f0b318d7eaa5532b34b9c4442f92a2f7667bd5f024372699f6
SHA512904992c889362973a0b32db7b11ad8f43b28c196df4be4ea8c731e86b3fe79373f4fb74b9c6caf3910d85326c59ebd416f8bcc658616917e75d4919046f443d2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UNKWO90C\m=attn,cdos,cr,dpf,hsm,jsa,d,csi[1].jsMD5
43e59d66b910326029e38cee08115a38
SHA199aca8637b020a7928df1f806746dbaceef58a12
SHA25690c93d9d2429d13eedd10d17ad51af7d75cdf784c5420ae7d06298f44c7282ac
SHA512803d6ccd96c0dd61356612dd6e24439b4a60eb886f3bd6186a4830d41dffb50fa56d3c332d80d05f8dcf957ac60710e4c58aac8c7affc1b1840ee6197d4ce01e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UNKWO90C\scheduler[1].jsMD5
f6dbc1f473d39f6158476b2d0a68a4be
SHA13a2f25cf456c2571ea5eacc332dc6b377c8cd339
SHA2564597bcb6895249fcf0f96e101c78d3bfbc6b2ff8f5a7117c7be9dc7f73bedcac
SHA512fef716e460634f3f869b690ccb6de7fe6c0b9105d4c3f4b8647acc161c8a1bdada155e764d2da86572857de876a6d63f71c61b3ca909268af7d901aa45fc36ef
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
3925282fc2e241e67830c44cd1f0ec85
SHA13b8c002a5236b5898c4e4b37ae1278be41a5336c
SHA256d85aece39a63dc6d665d94b5adc748a053899bb591a73f31eb06261c1b90c0c4
SHA5127095b70aeb65f798b435d92a220ac2a78d6534f8a57273c6aef351f7c6cff5cd10bd286206203faecd49633b8985861b368e993663c0a7e17275bfbd2666e5d8
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
e810dd5d9045d0bd143eec8088a25ba1
SHA17d872430cef43552fddccf5d62e58319f83a2110
SHA25619c92c2c75a5abbe4b1d36f4dd854fb7dc8562e44a0ea2a2a4785bce681c373f
SHA51203ec32a88179180c3064c0a510534a43f6f20bef4a23c2558c5719c9ad52b0aa555900263e1036abe9cbc9666bc60388c8f2f21086a0a08e86c4eca67d94f2a4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
3ff4d575d1d04c3b54f67a6310f2fc95
SHA11308937c1a46e6c331d5456bcd4b2182dc444040
SHA256021a5868b6c9e8beba07848ba30586c693f87ac02ee2ccaa0f26b7163c0c6b44
SHA5122b26501c4bf86ed66e941735c49ac445d683ad49ed94c5d87cc96228081ae2c8f4a8f44a2a5276b9f4b0962decfce6b9eeee38e42262ce8d865d5df0df7ec3d6
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
ad8a2de26da3dd00948592a66213e749
SHA1806c063c824e637a8749a0dc303c062333148d54
SHA256d35d9828a051ceb8cad5d964d64111526ab9d76f041fdc8f912f38df83da0993
SHA512797b7acd7bb43b553dd58c2c59c00c0d0ba9f9a6c74e5c621f73100329d3fd5935c69ff9400d9fd07ac9593e303e7c0503e7233899d634f95b44919d4ccf9503
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
bdbac14714b470e3809df901929bc43a
SHA1257b11dc42af39b9d276e6adb661d6ebfe0b052d
SHA256852adb5de64954bdab6e4ac4d3bd4e8bde0b2a9a36e45fce085d8edd47b349d4
SHA512bdf4348027ef7eb2765f16dd6f66c5c904bd232e22dc7f0ad4db7404a8f5488a7720b576bfadf606c11ab03ff2888f3cadf85b92e90686480fc6688704783d9e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
bdbac14714b470e3809df901929bc43a
SHA1257b11dc42af39b9d276e6adb661d6ebfe0b052d
SHA256852adb5de64954bdab6e4ac4d3bd4e8bde0b2a9a36e45fce085d8edd47b349d4
SHA512bdf4348027ef7eb2765f16dd6f66c5c904bd232e22dc7f0ad4db7404a8f5488a7720b576bfadf606c11ab03ff2888f3cadf85b92e90686480fc6688704783d9e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
5a3c004095e0644455e227fa63439c73
SHA1ae2d215d010ec57de6f3317f516a900a1a967393
SHA256a1d633cd9b1486df790f3aa126e6c19dca8cc98e1b28040226c47e08c7886476
SHA512cd912694884986a96dd62b97f7eeafba0d9812f8c30f3e1f8115980efadb38f6f2cc9890d62f8255492cb07275b67696c1601f3146b56a2ea7f2b0f6a109365f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\98Y0W1NG\www.google[1].xmlMD5
5a3c004095e0644455e227fa63439c73
SHA1ae2d215d010ec57de6f3317f516a900a1a967393
SHA256a1d633cd9b1486df790f3aa126e6c19dca8cc98e1b28040226c47e08c7886476
SHA512cd912694884986a96dd62b97f7eeafba0d9812f8c30f3e1f8115980efadb38f6f2cc9890d62f8255492cb07275b67696c1601f3146b56a2ea7f2b0f6a109365f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAMD5
0213524244eaf6a7e638bb1910432065
SHA16d854ce619828c2f1bfc4e93d2ee15d5970d6811
SHA2562ccb09ae116851a6dff4849062a18092d522a05897cecb74dfca383aa2dea296
SHA512010658183423cfc1f46a492e8b164499ea68cefea28901bf190ec231da967185842cf2d94fc5fff9fcf0362ad3f3ef2884d699ad49acd2d08bbcf506cfcc4ee9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAMD5
64e9b8bb98e2303717538ce259bec57d
SHA12b07bf8e0d831da42760c54feff484635009c172
SHA25676bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331
SHA5128980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_F23AE0988B5AEC53578C63EE6A32AAF8MD5
253f9328880bad2059f0a55698e6f605
SHA12fbe919eadf780fd9f8853111cf695ab0b14e97d
SHA256e01313ed8d8afc9d26b293b84cce7dee064558b27d24436cfbf5a06d63813c27
SHA512cdf783652aaa5f5593abf1b5bacba3ff39f5d1f1cbf549969d999ab6a2e9d698a0be1fdf604ce9bbb1fb6e643aa1a99adf5ef9aada8b578fca7e2c7cf609e256
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_C15B120C7F4EE6F1182923868E66174BMD5
f866ff7d1a533d7938a36c851589902c
SHA1d060e80dfb63b0d29fa36803858f0fac88f69055
SHA2567302b62fc43148a3bc5c6923280c81da999442e1c353078d327d4f9c5cce2ac4
SHA512c6c8cb61e3c3c7fed7f57932fecc7576df90ba8123b61c18452df0ad11bc774c5917f894baa752e9f8d701580d2917a15f1d6eb69ef1901b3d3eb6f27fa8de88
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_CF98E93287B57910F3C2F3AE8F983EDCMD5
d6c1a18d132153be0830f7b018be54f6
SHA133898ffb8c6f553bf25047d3da64667aa4fbf344
SHA2560220671d22702f4658b9562f983c9f40a41bf291f55df2d415a538a4fdbf04d7
SHA512dfd0b6d0e1db9cc96f43941b6400ea01891bc4f7c382c686e03b366de591fab1cb248061afa07e8962647811d5754461b8448176b5a0a81fda0d760378c3f945
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAMD5
7efc52b2de61a0fa629a46a195578239
SHA135d2683096b2fdfa03baa087bfd473ff6b00e725
SHA25663fd7d94ce76a9d129cac9b2a9f9c095630b954196f16346743764ed137852fe
SHA5127d66d01792905145478f5ffcd62285c034de2cdea508471d81ebaedd12606bd6f6f7c3db6128a17e7e6d31313a16a3f892915df2158b972a5287b0f1910ac69c
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAMD5
049d320e38b5e75f494182e75a47b005
SHA12b30556a4bd888f7d1811223017825f55ec424f1
SHA256c61daee26aa1127b7fcfb0f978023d27f924a46263b8128bffe8bffafa9c81a5
SHA512c7d97fec0bb89d9251edc8c09e2898e32be8777eaf28700a21345ff18bdf9f38dcc7c58958b731a9a718a13e3b127597463833de29424136650de71c33c8dd3f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_F23AE0988B5AEC53578C63EE6A32AAF8MD5
8fcb345e0a76097f072cb2cdb5433ff5
SHA1b1179686a46a2ca4fff269bc3b010005324a8cd9
SHA25638847f4c45181ca03acf619dcc64483b695e9c2ee5bb06506225da381c5e31fa
SHA512fbdc87716d58c8937175d9e31e6154b7b6c98c6a4dc846f04162d09340194100b08b2a0096f8684b6518fbaa974bb549bc5815279f866106d02209ef9b4154a4
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_C15B120C7F4EE6F1182923868E66174BMD5
1cf0bafc58ff7eb01174a97cdd408baf
SHA19cf4ce5a2d5d8ab871280bd3b30c89e52aaa8794
SHA256c552b9fa478e57711124fa47ea1d57f385e8e998965fcd54d6775dab8dd44934
SHA512001524027a098d9f63b6fb6c589f7bd71739bf3cd8fe42801c787723a11cb7cdb7e28f5cda9960c04fb48026e53bcd8725dc240625a7e025b2cb980895442e5e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_CF98E93287B57910F3C2F3AE8F983EDCMD5
36137d300de012c57d5f1c1cf58669fd
SHA1867d10614467f57aca2bc2ce00bf2a74230ad3e8
SHA256b20bd21a2065c7511faeb8752f1f4d66437933d5989a91a3e02c5eab951925c0
SHA51207ea6941c848bb258a2a23694d3f0ca17407d7232f4bd7082e570d0477bc4f78522aaef62d510b4d0a6b914c368fc592282390c92925052b28a70f587b95dc26
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\1659841449.priMD5
6dfa43a584ed243390dc943abac397c0
SHA1665637e060c9da24288944b90b377a309da6d533
SHA2564f31fe4baa7a557ed5fc2ccf57b2861946ecea6222200aca124796e251a524ad
SHA5129561a2867cf1e73578d0206d4c73e576e2b8c7497ec1db8a69df6a35ca78e84bf01060089e45ec32e5afde6d3b1de26afcd0e411a25b615042ce5bdd575cb6b0
-
C:\Windows\assembly\GAC_MSILMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/412-118-0x0000019EF1220000-0x0000019EF1520000-memory.dmpFilesize
3.0MB
-
memory/2952-148-0x000001B138600000-0x000001B138700000-memory.dmpFilesize
1024KB
-
memory/2952-149-0x000001B1386E8000-0x000001B1386F0000-memory.dmpFilesize
32KB
-
memory/3436-190-0x000000001BDE6000-0x000000001BDE8000-memory.dmpFilesize
8KB
-
memory/3436-201-0x000000001BDE8000-0x000000001BDEA000-memory.dmpFilesize
8KB
-
memory/3436-115-0x0000000000770000-0x00000000007B4000-memory.dmpFilesize
272KB
-
memory/3436-117-0x000000001BDE2000-0x000000001BDE4000-memory.dmpFilesize
8KB
-
memory/3436-116-0x000000001BDE0000-0x000000001BDE2000-memory.dmpFilesize
8KB
-
memory/3436-161-0x000000001BDE4000-0x000000001BDE6000-memory.dmpFilesize
8KB
-
memory/3436-218-0x000000001BDEA000-0x000000001BDEF000-memory.dmpFilesize
20KB
-
memory/3436-222-0x000000002CD70000-0x000000002CD74000-memory.dmpFilesize
16KB
-
memory/3436-225-0x000000002CD74000-0x000000002CD77000-memory.dmpFilesize
12KB