Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
13-08-2022 04:49
Static task
static1
Behavioral task
behavioral1
Sample
d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe
Resource
win10-20220812-en
General
-
Target
d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe
-
Size
1.7MB
-
MD5
71b5b59a6cd5822105c645f6da3dede9
-
SHA1
dabf8ddb37a147e8b8a864f709979fc393c2b5f2
-
SHA256
d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522
-
SHA512
ed77dc6dd253172fee2821a94d78cf030859fff8373f3bd2bc460459bfa22ebbd605f957ad4cda8dd1643d827cc30b0ab9b95efa3d8f8fb62c59e5fb8492ec91
Malware Config
Extracted
redline
nam3
103.89.90.61:34589
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
5
176.113.115.146:9582
-
auth_value
d38b30c1ccd6c1e5088d9e5bd9e51b0f
Extracted
redline
RuXaRR_GG
insttaller.com:40915
-
auth_value
4a733ff307847db3ee220c11d113a305
Extracted
redline
5076357887
195.54.170.157:16525
-
auth_value
0dfaff60271d374d0c206d19883e06f3
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 15 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline behavioral1/memory/4204-681-0x00000000005B0000-0x00000000005D0000-memory.dmp family_redline behavioral1/memory/4704-683-0x0000000000450000-0x0000000000470000-memory.dmp family_redline behavioral1/memory/3980-682-0x0000000000260000-0x00000000002A4000-memory.dmp family_redline behavioral1/memory/1848-680-0x00000000001E0000-0x0000000000200000-memory.dmp family_redline behavioral1/memory/4336-742-0x0000000000580000-0x00000000005A0000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
Processes:
F0geI.exekukurzka9000.exenamdoitntn.exereal.exesafert44.exetag.exejshainx.exeffnameedit.exerawxdev.exeEU1.exeMinecraftForge.exedllhost.exepid process 3064 F0geI.exe 3948 kukurzka9000.exe 4204 namdoitntn.exe 4164 real.exe 3980 safert44.exe 4336 tag.exe 4704 jshainx.exe 1848 ffnameedit.exe 524 rawxdev.exe 1420 EU1.exe 5576 MinecraftForge.exe 160 dllhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Control Panel\International\Geo\Nation d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
dllhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 10 IoCs
Processes:
d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\jshainx.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\tag.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\rawxdev.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\EU1.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe -
Drops file in Windows directory 11 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 5628 schtasks.exe 3440 schtasks.exe 4200 schtasks.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 51e0d6d06eaed801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{13C022F9-DD26-431D-B8B2-7B851C66190E} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 2be2f7fce0aed801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{0C29F14E-E9EE-41C0-91EB-569988531274}" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 883f70e9e0aed801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$WordPress MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
real.exejshainx.exesafert44.exeffnameedit.exenamdoitntn.exeMinecraftForge.exepowershell.exedllhost.exepid process 4164 real.exe 4164 real.exe 4704 jshainx.exe 3980 safert44.exe 4704 jshainx.exe 3980 safert44.exe 1848 ffnameedit.exe 1848 ffnameedit.exe 4204 namdoitntn.exe 4204 namdoitntn.exe 5576 MinecraftForge.exe 5576 MinecraftForge.exe 5604 powershell.exe 5604 powershell.exe 5604 powershell.exe 5604 powershell.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe 160 dllhost.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4492 MicrosoftEdgeCP.exe 4492 MicrosoftEdgeCP.exe 4492 MicrosoftEdgeCP.exe 4492 MicrosoftEdgeCP.exe 4492 MicrosoftEdgeCP.exe 4492 MicrosoftEdgeCP.exe 4492 MicrosoftEdgeCP.exe 4492 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exejshainx.exesafert44.exeffnameedit.exenamdoitntn.exeMinecraftForge.exepowershell.exedllhost.exedescription pid process Token: SeDebugPrivilege 2360 MicrosoftEdge.exe Token: SeDebugPrivilege 2360 MicrosoftEdge.exe Token: SeDebugPrivilege 2360 MicrosoftEdge.exe Token: SeDebugPrivilege 2360 MicrosoftEdge.exe Token: SeDebugPrivilege 4900 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4900 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4900 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4900 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 6104 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 6104 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4704 jshainx.exe Token: SeDebugPrivilege 3980 safert44.exe Token: SeDebugPrivilege 1848 ffnameedit.exe Token: SeDebugPrivilege 4204 namdoitntn.exe Token: SeDebugPrivilege 5576 MinecraftForge.exe Token: SeDebugPrivilege 5604 powershell.exe Token: SeDebugPrivilege 160 dllhost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 2360 MicrosoftEdge.exe 4492 MicrosoftEdgeCP.exe 4492 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exeMicrosoftEdgeCP.exejshainx.exeMinecraftForge.execmd.exedescription pid process target process PID 1816 wrote to memory of 3064 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe F0geI.exe PID 1816 wrote to memory of 3064 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe F0geI.exe PID 1816 wrote to memory of 3064 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe F0geI.exe PID 1816 wrote to memory of 3948 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe kukurzka9000.exe PID 1816 wrote to memory of 3948 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe kukurzka9000.exe PID 1816 wrote to memory of 3948 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe kukurzka9000.exe PID 1816 wrote to memory of 4204 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe namdoitntn.exe PID 1816 wrote to memory of 4204 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe namdoitntn.exe PID 1816 wrote to memory of 4204 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe namdoitntn.exe PID 1816 wrote to memory of 4164 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe real.exe PID 1816 wrote to memory of 4164 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe real.exe PID 1816 wrote to memory of 4164 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe real.exe PID 1816 wrote to memory of 3980 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe safert44.exe PID 1816 wrote to memory of 3980 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe safert44.exe PID 1816 wrote to memory of 3980 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe safert44.exe PID 1816 wrote to memory of 4336 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe tag.exe PID 1816 wrote to memory of 4336 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe tag.exe PID 1816 wrote to memory of 4336 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe tag.exe PID 1816 wrote to memory of 4704 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe jshainx.exe PID 1816 wrote to memory of 4704 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe jshainx.exe PID 1816 wrote to memory of 4704 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe jshainx.exe PID 1816 wrote to memory of 1848 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe ffnameedit.exe PID 1816 wrote to memory of 1848 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe ffnameedit.exe PID 1816 wrote to memory of 1848 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe ffnameedit.exe PID 1816 wrote to memory of 524 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe rawxdev.exe PID 1816 wrote to memory of 524 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe rawxdev.exe PID 1816 wrote to memory of 524 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe rawxdev.exe PID 1816 wrote to memory of 1420 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe EU1.exe PID 1816 wrote to memory of 1420 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe EU1.exe PID 1816 wrote to memory of 1420 1816 d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe EU1.exe PID 4492 wrote to memory of 3176 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 3176 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 3176 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 3176 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 1008 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 1008 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 1008 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 1008 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 4104 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 4104 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 4104 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 4104 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 1676 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 1676 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 1676 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 1676 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 944 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 944 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 944 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4492 wrote to memory of 944 4492 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4704 wrote to memory of 5576 4704 jshainx.exe MinecraftForge.exe PID 4704 wrote to memory of 5576 4704 jshainx.exe MinecraftForge.exe PID 4704 wrote to memory of 5576 4704 jshainx.exe MinecraftForge.exe PID 5576 wrote to memory of 5084 5576 MinecraftForge.exe cmd.exe PID 5576 wrote to memory of 5084 5576 MinecraftForge.exe cmd.exe PID 5576 wrote to memory of 5084 5576 MinecraftForge.exe cmd.exe PID 5084 wrote to memory of 3248 5084 cmd.exe chcp.com PID 5084 wrote to memory of 3248 5084 cmd.exe chcp.com PID 5084 wrote to memory of 3248 5084 cmd.exe chcp.com PID 5084 wrote to memory of 5604 5084 cmd.exe powershell.exe PID 5084 wrote to memory of 5604 5084 cmd.exe powershell.exe PID 5084 wrote to memory of 5604 5084 cmd.exe powershell.exe PID 5576 wrote to memory of 160 5576 MinecraftForge.exe dllhost.exe PID 5576 wrote to memory of 160 5576 MinecraftForge.exe dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe"C:\Users\Admin\AppData\Local\Temp\d70e9f082865c471e3fc2a6f4c94484f6efa8f6b8b8498f7290fc64d45b5d522.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Company\NewProduct\tag.exe"C:\Program Files (x86)\Company\NewProduct\tag.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exe"C:\Program Files (x86)\Company\NewProduct\jshainx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exe"C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2295" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3700" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3123" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk1699" /TR "C:\ProgramData\Dllhost\dllhost.exe"5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json5⤵
-
C:\Program Files (x86)\Company\NewProduct\rawxdev.exe"C:\Program Files (x86)\Company\NewProduct\rawxdev.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"C:\Program Files (x86)\Company\NewProduct\ffnameedit.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\EU1.exe"C:\Program Files (x86)\Company\NewProduct\EU1.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\2e3101de9762478bb0abaf401de0a6f7 /t 0 /p 37081⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
281KB
MD5ba3a49c828d27a3c6b1bc179e76af540
SHA1373f8edd1a12b4e333bd54c03553f0874091f60e
SHA256e7071de8c17a23fc79c11e89d59af2049796fcbf6a46523e1e9a1071772158f1
SHA512e0c9e9eb2943ae9a6edfb6d7f9681f3e3050f6f5f6e17485be93f597fae7442aded2eca90712c452dd8ad6cb23162be2a51deb67fdb3ba8bf72239615696b0fb
-
C:\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
281KB
MD5ba3a49c828d27a3c6b1bc179e76af540
SHA1373f8edd1a12b4e333bd54c03553f0874091f60e
SHA256e7071de8c17a23fc79c11e89d59af2049796fcbf6a46523e1e9a1071772158f1
SHA512e0c9e9eb2943ae9a6edfb6d7f9681f3e3050f6f5f6e17485be93f597fae7442aded2eca90712c452dd8ad6cb23162be2a51deb67fdb3ba8bf72239615696b0fb
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
339KB
MD5501e0f6fa90340e3d7ff26f276cd582e
SHA11bce4a6153f71719e786f8f612fbfcd23d3e130a
SHA256f07d918c6571f11abf9ab7268ac6e2ecbcd931c3d9d878895c777d15052aae2b
SHA512dee3aabfca7912f15b628253222cfe8d8e13cd64f0438e8d705b68b0a14b4c9523b7a207583be7b424e444d6b05f237484a0c38bf2e075d347ef937d409a3a69
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
107KB
MD54bf892a854af9af2802f526837819f6e
SHA109f2e9938466e74a67368ecd613efdc57f80c30b
SHA256713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf
SHA5127ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44
-
C:\Program Files (x86)\Company\NewProduct\ffnameedit.exeFilesize
107KB
MD54bf892a854af9af2802f526837819f6e
SHA109f2e9938466e74a67368ecd613efdc57f80c30b
SHA256713eeb4e9271fe4b15160d900ad78498838bb33f7f97ad544a705ab2a46d97cf
SHA5127ef9d8cb4daf6be60c5a41439dab4e7384676b34de2341ac52cb33815645fbb51a4b78725ea97479d287a8d7a0a61b4b337b1ad49cce2a23c9192fd9b7678d44
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD52647a5be31a41a39bf2497125018dbce
SHA1a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA25684c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
SHA51268f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD52647a5be31a41a39bf2497125018dbce
SHA1a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA25684c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
SHA51268f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD58df3405e9cd1a18d10568e0d32e6dc39
SHA1a084252242da8dbf97f23d7785fdf2b8d9677d3b
SHA25679516c040ffbb1121904be5b09cd8a7e6fb78885dcc08a9e33781258680b639b
SHA5126f3e242723983ea2d04d0857d88e2706d53ec9d9b8c030e25e28a60f70813bdd8a8082db60f70b79ed20d6544b8fc069b7fd096da78bbd64b08a5435adfbaa87
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.4MB
MD58df3405e9cd1a18d10568e0d32e6dc39
SHA1a084252242da8dbf97f23d7785fdf2b8d9677d3b
SHA25679516c040ffbb1121904be5b09cd8a7e6fb78885dcc08a9e33781258680b639b
SHA5126f3e242723983ea2d04d0857d88e2706d53ec9d9b8c030e25e28a60f70813bdd8a8082db60f70b79ed20d6544b8fc069b7fd096da78bbd64b08a5435adfbaa87
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
107KB
MD5bbd8ea73b7626e0ca5b91d355df39b7f
SHA166e298653beb7f652eb44922010910ced6242879
SHA2561aa3fdc24e789b01a39944b85c99e4ac08864d2eae7530164cea2821acbf184e
SHA512625cc9c108b4660030be1282493700e5f0ccfb973f466f61254ed1e1a96f5f042cdeaa94607825a2f694647468e2f525a6451542fe3aac785ebac1ccfe39864f
-
C:\Program Files (x86)\Company\NewProduct\rawxdev.exeFilesize
1.2MB
MD5919cf73749642aa08fb76e9254af5efa
SHA108c25ab3572b9035496aec516342e37a25a84883
SHA2562a31d54ca5b61e6c51c9fb64f3c8d7f081ccd9f5bf525396101d68c3d6050db3
SHA5125b632aa85adf0dafa2eacee4addd2329334ddf3d7f6c12e8bce2c302722c7ccd61cfac5fa194870e9f775b64275d8c9e14c9f160e3fbb6d0cc03f9432c9a28f6
-
C:\Program Files (x86)\Company\NewProduct\rawxdev.exeFilesize
1.2MB
MD5919cf73749642aa08fb76e9254af5efa
SHA108c25ab3572b9035496aec516342e37a25a84883
SHA2562a31d54ca5b61e6c51c9fb64f3c8d7f081ccd9f5bf525396101d68c3d6050db3
SHA5125b632aa85adf0dafa2eacee4addd2329334ddf3d7f6c12e8bce2c302722c7ccd61cfac5fa194870e9f775b64275d8c9e14c9f160e3fbb6d0cc03f9432c9a28f6
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
282KB
MD5474861050e6a7b65bc4521096cb05454
SHA14e1aabe27598171a89c219aab860b325a4358b22
SHA256ccd962957659555af7c607deb20a4ec34a1578af037d5310ffd07bd092f0ebc7
SHA51242afff00dd616fc73d1c338184149ddb66376e808cd2da39a94357c8d296a245ab0f1e474aac1789d613efef3c1867e0c3a2e41c07ac21bcc07e00ea08309a79
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
246KB
MD5414ffd7094c0f50662ffa508ca43b7d0
SHA16ec67bd53da2ff3d5538a3afcc6797af1e5a53fb
SHA256d3fb9c24b34c113992c5c658f6a11f9620da2e49d12d1acabe871e1bea7846ee
SHA512c6527077b4822c062e32c39be06e285916b501a358991d120a469f5da1e13d282685ca7ca3fa938292d5beef073fbea42ff9ba96fa5c395f057f7c964608a399
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
951KB
MD52f65aa26f19b301f51a2d954f1c26821
SHA163acc00e697efdeaa57f7657e6d95758173e482e
SHA256c01ed91474cdef0cd5d17a6b36a41c8ebc919abc133c04af3d1f4df67dfe590d
SHA512af732f9cac31fde6de525faed92b468b38acda3ffca9c94f2c41f027b01e65dacc085c7d8563462f71d8573c2190a6014d79490e9cb0af5ca37ebf26a3aaa326
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
951KB
MD52f65aa26f19b301f51a2d954f1c26821
SHA163acc00e697efdeaa57f7657e6d95758173e482e
SHA256c01ed91474cdef0cd5d17a6b36a41c8ebc919abc133c04af3d1f4df67dfe590d
SHA512af732f9cac31fde6de525faed92b468b38acda3ffca9c94f2c41f027b01e65dacc085c7d8563462f71d8573c2190a6014d79490e9cb0af5ca37ebf26a3aaa326
-
C:\ProgramData\SystemFiles\sys_rh.binFilesize
1KB
MD50cdf43198d2721395850bbe27d83391f
SHA14d80abbc82b8ab42e0e798e61e2778445d2c2a1c
SHA2569b8144e93a03858de025bd01b0bb5d6c757da4ec91343a5a2a8e3832606cea01
SHA5127f7f393034d73c275adf92d61271e51c7156e8d5df19f76653ed1abebf44b2b40e48369daf5f9729bbd585b5f3c70f1abfdec31c777be134ef8c6cbf4c812907
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\7SNBENSM.cookieFilesize
256B
MD589669a0a46a414c4e20147b1d6f1249b
SHA16dd6066aeb062ee9b194ab558583ae769197190b
SHA256e90582f8d03617739c433916059ce67e9dc17a4da3937576dcf677fc8aa329b5
SHA512ec24b381bed05cd19ee8bb5de3d7c2d53728dc954fed4da7331511d8feffe35f0aed3eae3b3221df845f065b74eee7eebccfbf7dd16c4d3cd3dca0badb0affa0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\C5460XM6.cookieFilesize
340B
MD50e84b64cf53e98fd855f9c61240ade30
SHA1f25b773991235819a52587bd2b76b16f359338b6
SHA2569460ec791507265b0c1d60c3b793b79f1ebb0aa35fa02b35771d6582ce008962
SHA512d8bcce458ffcfb260b8b912c1afb83bd0319ded86a646d299bc6b43e85e5c04b62de2e379fb0e9fb63cef9d067bb6795a8547210768183de60e0d8edaccae296
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\JXNRXWAV.cookieFilesize
172B
MD5aa0acee96de840ac43997768716aea96
SHA1cc6fde44286fee564f5ed6a29ecb7d60110d9570
SHA2563c6e651837dd10ce6b66ae8dd49c9876369558c8e86c9fae2bafd72925fa15c3
SHA512183e3ac06842f09c58caddfface0bc5d7cdf2b239b4df6c2e6f50a528f00a1069f0c40cf1ab1b29d7f919266ae25612ff72f40ef1b0d789b88ceb488cc4a7028
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\Q9ZQBX3N.cookieFilesize
424B
MD5fd348093b93a662f0a106ce251f6965c
SHA19ba31b6505b9b2818cb8cc2ec1c79be7476a178a
SHA2566bf41fb1874ce8fb1a2ddfaaa3f7354fa8181f95f66f4201ec4f5f15783a3387
SHA512c20404fee872b4a30e58f79325b01c47c4ea49e2452502a6117e74b80b1df0c21234b17eb0cbdc52af6721d46bf20324b3ded7f57073c54fafa608fc392f5512
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\QSMCELPR.cookieFilesize
592B
MD50e56213b2eadffd8e99b44c25e35b458
SHA1c91872d883a96557615bbbe2264985f2e59e7afa
SHA2569d261ef7304dcf2b7f552481619ddaf4eab88485191ae1faa99898ab4a1ad1b4
SHA51247d786ff7aeee6ff816680c614745f1f48a3aa293021034a189918b62b45e29b305ab4c07ecbb24e9d0068d874eafbf3084eeecf2b6f5d98a070da06b27e7627
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\U1EZMQZD.cookieFilesize
508B
MD57779843e7d8f056ba8f20bf7c55ba457
SHA1a9477ff2644be0b0b7fdff6211e128bc1f5b764f
SHA25692dfafcf9b0fb5c63ff9060e0dfc61f489da5d70fb34bc56ee3400fd232b9585
SHA51234783522fb1ccc19a71cd560af365fc060a00ed54b38c29458a44655ef1c8b6d0c8a6620a5c5ee6c824ae23bdb636962361458e63b441324a79684e66a2c03b5
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5ff189dcd1819d4e232d86c2af98c684d
SHA13d048d2c75c6f822a5dce2846c3cb9ab33a99b7d
SHA256205cbbc2960b88adb5eb7d832042e87bf16294a305e88d39bf3420e6406203e0
SHA51211b6c165ed82563148f1885ba2ee65859123efc3465acef53d70dd7e4ed48557aa85e2b662e7dc17db2b98fee68fdd778cc8047498eb5192801a18c7240a0ee9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD5ff189dcd1819d4e232d86c2af98c684d
SHA13d048d2c75c6f822a5dce2846c3cb9ab33a99b7d
SHA256205cbbc2960b88adb5eb7d832042e87bf16294a305e88d39bf3420e6406203e0
SHA51211b6c165ed82563148f1885ba2ee65859123efc3465acef53d70dd7e4ed48557aa85e2b662e7dc17db2b98fee68fdd778cc8047498eb5192801a18c7240a0ee9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD55f4741a1eb1894d15204d5cc0eb67659
SHA1f702a892c7ee48bc14ee0578c5e149f82dc25a70
SHA25629e2799b506495a15bb406bcfcccb71b77faf0f4e32c639e0be14af592e2e4f8
SHA5123c83af2646c0e2b33f707e00c4d2c4c5072d4d6351688651ddca788577f9bc67606f3a0998f33025e92358d5ec4e5e3afec49341c43250ed1a544b4a4c92c095
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD55f4741a1eb1894d15204d5cc0eb67659
SHA1f702a892c7ee48bc14ee0578c5e149f82dc25a70
SHA25629e2799b506495a15bb406bcfcccb71b77faf0f4e32c639e0be14af592e2e4f8
SHA5123c83af2646c0e2b33f707e00c4d2c4c5072d4d6351688651ddca788577f9bc67606f3a0998f33025e92358d5ec4e5e3afec49341c43250ed1a544b4a4c92c095
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD579bb122b2f5bb09f541013d217992d43
SHA11a397fe785c2d992c07ae55554b10d9d50e59d6d
SHA2561d84f68314532eb1ab77dbf56b6c9edbb042e17fab92950138f1eb10252876c7
SHA512e70543b263853c81256e084ca7475e4e6672ef99c0acb34f5d90576271948297b528bb9b127734ea87097351c4abbb3462fb12e356c9da03b596a2880251c8ce
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD53c651be344f48d91ca10cdd46da712f2
SHA11217e540c6c3e20f59540d4eb913b7b90aabb730
SHA256a92e5c7ec96686150709efe84f1e85d56a1ff98fc4d883c4d2f4546d69072c66
SHA512914cdda22fc7cb78f0774fe321943687ff6459993c2f33657db71aff4b4b013b51b0c86d3028b2dbb3340be8ba01118f87b47dd50cbbc5d224ca978048874d8d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2219095117.priFilesize
207KB
MD5e2b88765ee31470114e866d939a8f2c6
SHA1e0a53b8511186ff308a0507b6304fb16cabd4e1f
SHA256523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e
SHA512462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d
-
C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exeFilesize
71KB
MD5f8370d132f334be6703ce54b08db1578
SHA155d98f702724f25535bfbeb7a46cee92d57a4421
SHA2562b058754c1b4402ccc99db8e247f234593bb96015af801f2ee6880425b126fb6
SHA5120eee39de1ffb965744c97a1c6918ccd755a4fae18d889893244e9d0e3760f28615e46cce524930f1d9f18540bbd6644cd45765c8f95f04c615a0ff682136b35b
-
C:\Users\Admin\AppData\Local\Temp\MinecraftForge.exeFilesize
71KB
MD5f8370d132f334be6703ce54b08db1578
SHA155d98f702724f25535bfbeb7a46cee92d57a4421
SHA2562b058754c1b4402ccc99db8e247f234593bb96015af801f2ee6880425b126fb6
SHA5120eee39de1ffb965744c97a1c6918ccd755a4fae18d889893244e9d0e3760f28615e46cce524930f1d9f18540bbd6644cd45765c8f95f04c615a0ff682136b35b
-
memory/160-1364-0x0000000000F50000-0x0000000001044000-memory.dmpFilesize
976KB
-
memory/160-1380-0x0000000003470000-0x0000000003476000-memory.dmpFilesize
24KB
-
memory/160-1293-0x0000000000000000-mapping.dmp
-
memory/524-351-0x0000000000000000-mapping.dmp
-
memory/612-1591-0x0000000000000000-mapping.dmp
-
memory/1420-362-0x0000000000000000-mapping.dmp
-
memory/1816-164-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-137-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-168-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-169-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-170-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-167-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-171-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-172-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-173-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-174-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-175-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-176-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-177-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-178-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-179-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-180-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-181-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-182-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-183-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-165-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-130-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-131-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-121-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-120-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-122-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-163-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-129-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-162-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-161-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-128-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-160-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-123-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-159-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-158-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-132-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-157-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-146-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-150-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-156-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-155-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-154-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-153-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-152-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-151-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-149-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-148-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-147-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-145-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-144-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-143-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-142-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-141-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-140-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-139-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-138-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-133-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-134-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-127-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-124-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-125-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-126-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-166-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-135-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1816-136-0x0000000077D10000-0x0000000077E9E000-memory.dmpFilesize
1.6MB
-
memory/1848-340-0x0000000000000000-mapping.dmp
-
memory/1848-680-0x00000000001E0000-0x0000000000200000-memory.dmpFilesize
128KB
-
memory/1848-957-0x0000000005E20000-0x0000000005EB2000-memory.dmpFilesize
584KB
-
memory/1848-887-0x00000000053C0000-0x00000000053FE000-memory.dmpFilesize
248KB
-
memory/1848-951-0x0000000005D00000-0x0000000005D76000-memory.dmpFilesize
472KB
-
memory/3064-664-0x0000000000470000-0x00000000005BA000-memory.dmpFilesize
1.3MB
-
memory/3064-668-0x0000000002040000-0x0000000002050000-memory.dmpFilesize
64KB
-
memory/3064-671-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/3064-919-0x0000000000470000-0x00000000005BA000-memory.dmpFilesize
1.3MB
-
memory/3064-921-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/3064-308-0x0000000000000000-mapping.dmp
-
memory/3216-1438-0x0000000000000000-mapping.dmp
-
memory/3248-1155-0x0000000000000000-mapping.dmp
-
memory/3440-1490-0x0000000000000000-mapping.dmp
-
memory/3948-842-0x0000000000880000-0x0000000000892000-memory.dmpFilesize
72KB
-
memory/3948-851-0x0000000000400000-0x000000000056A000-memory.dmpFilesize
1.4MB
-
memory/3948-863-0x0000000000400000-0x000000000056A000-memory.dmpFilesize
1.4MB
-
memory/3948-309-0x0000000000000000-mapping.dmp
-
memory/3980-731-0x0000000000AF0000-0x0000000000AF6000-memory.dmpFilesize
24KB
-
memory/3980-940-0x0000000005070000-0x00000000050D6000-memory.dmpFilesize
408KB
-
memory/3980-981-0x00000000067B0000-0x0000000006972000-memory.dmpFilesize
1.8MB
-
memory/3980-982-0x0000000008410000-0x000000000893C000-memory.dmpFilesize
5.2MB
-
memory/3980-682-0x0000000000260000-0x00000000002A4000-memory.dmpFilesize
272KB
-
memory/3980-319-0x0000000000000000-mapping.dmp
-
memory/3980-860-0x0000000005170000-0x0000000005776000-memory.dmpFilesize
6.0MB
-
memory/4164-315-0x0000000000000000-mapping.dmp
-
memory/4200-1489-0x0000000000000000-mapping.dmp
-
memory/4204-954-0x0000000007980000-0x0000000007E7E000-memory.dmpFilesize
5.0MB
-
memory/4204-681-0x00000000005B0000-0x00000000005D0000-memory.dmpFilesize
128KB
-
memory/4204-960-0x0000000006230000-0x000000000624E000-memory.dmpFilesize
120KB
-
memory/4204-310-0x0000000000000000-mapping.dmp
-
memory/4336-325-0x0000000000000000-mapping.dmp
-
memory/4336-862-0x0000000004D90000-0x0000000004DA2000-memory.dmpFilesize
72KB
-
memory/4336-865-0x0000000004EC0000-0x0000000004FCA000-memory.dmpFilesize
1.0MB
-
memory/4336-742-0x0000000000580000-0x00000000005A0000-memory.dmpFilesize
128KB
-
memory/4336-900-0x0000000004E30000-0x0000000004E7B000-memory.dmpFilesize
300KB
-
memory/4704-683-0x0000000000450000-0x0000000000470000-memory.dmpFilesize
128KB
-
memory/4704-992-0x00000000061B0000-0x0000000006200000-memory.dmpFilesize
320KB
-
memory/4704-332-0x0000000000000000-mapping.dmp
-
memory/4880-1422-0x0000000000000000-mapping.dmp
-
memory/5084-1149-0x0000000000000000-mapping.dmp
-
memory/5104-1419-0x0000000000000000-mapping.dmp
-
memory/5144-1449-0x0000000000000000-mapping.dmp
-
memory/5256-1429-0x0000000000000000-mapping.dmp
-
memory/5276-1463-0x0000000000000000-mapping.dmp
-
memory/5572-1443-0x0000000000000000-mapping.dmp
-
memory/5576-1137-0x000000000A100000-0x000000000A10A000-memory.dmpFilesize
40KB
-
memory/5576-1058-0x0000000000000000-mapping.dmp
-
memory/5576-1120-0x00000000009D0000-0x00000000009D6000-memory.dmpFilesize
24KB
-
memory/5576-1113-0x00000000003B0000-0x00000000003C8000-memory.dmpFilesize
96KB
-
memory/5604-1247-0x0000000007ED0000-0x0000000008220000-memory.dmpFilesize
3.3MB
-
memory/5604-1268-0x00000000096E0000-0x0000000009713000-memory.dmpFilesize
204KB
-
memory/5604-1683-0x0000000009910000-0x000000000992A000-memory.dmpFilesize
104KB
-
memory/5604-1252-0x0000000007D80000-0x0000000007D9C000-memory.dmpFilesize
112KB
-
memory/5604-1269-0x00000000096A0000-0x00000000096BE000-memory.dmpFilesize
120KB
-
memory/5604-1163-0x0000000000000000-mapping.dmp
-
memory/5604-1242-0x0000000007C80000-0x0000000007CE6000-memory.dmpFilesize
408KB
-
memory/5604-1240-0x0000000007580000-0x00000000075A2000-memory.dmpFilesize
136KB
-
memory/5604-1204-0x00000000075E0000-0x0000000007C08000-memory.dmpFilesize
6.2MB
-
memory/5604-1199-0x0000000006E80000-0x0000000006EB6000-memory.dmpFilesize
216KB
-
memory/5604-1278-0x0000000009720000-0x00000000097C5000-memory.dmpFilesize
660KB
-
memory/5604-1282-0x0000000009A00000-0x0000000009A94000-memory.dmpFilesize
592KB
-
memory/5624-1454-0x0000000000000000-mapping.dmp
-
memory/5628-1491-0x0000000000000000-mapping.dmp
-
memory/5684-1459-0x0000000000000000-mapping.dmp
-
memory/5872-1433-0x0000000000000000-mapping.dmp
-
memory/5896-1425-0x0000000000000000-mapping.dmp
-
memory/6084-1420-0x0000000000000000-mapping.dmp