Analysis

  • max time kernel
    1652s
  • max time network
    1599s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/02/2024, 19:28

General

  • Target

    iediagcmd.exe

  • Size

    503KB

  • MD5

    8750d59a78373b1a1d833cb508edeb47

  • SHA1

    b46e1feae746053f1f904244cd8726f25c956b22

  • SHA256

    753e58a658c285a7895f140b715ed733507949453de4869ce11307cc7e93f4de

  • SHA512

    1b085ad8dff18e31610603ca28a54c098eae546f157289126ac013bd2efd64d1a939be89deac48265f9218f6175b38fcd7a76e9c0ee7976bf580470b7281cd6d

  • SSDEEP

    12288:5jQJGJ17jTmRpq1Zi2HFG2YIwgjrbp21ZZ:tQJGJIX07YIwwrdK

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Drops file in System32 directory 15 IoCs
  • Drops file in Windows directory 23 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 32 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\iediagcmd.exe
    "C:\Users\Admin\AppData\Local\Temp\iediagcmd.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\system32\dxdiag.exe
      "C:\Windows\system32\dxdiag.exe" /x C:\Users\Admin\AppData\Local\Temp\dxdiag.xml
      2⤵
      • Registers COM server for autorun
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4268
    • C:\Windows\SYSTEM32\ipconfig.exe
      "ipconfig" /all
      2⤵
      • Gathers network information
      PID:1064
    • C:\Windows\SYSTEM32\route.exe
      "route" print
      2⤵
        PID:3704
      • C:\Windows\system32\netsh.exe
        "C:\Windows\system32\netsh.exe" in tcp show global
        2⤵
          PID:3844
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" advfirewall firewall show rule name=all verbose
          2⤵
          • Modifies Windows Firewall
          • Drops file in Windows directory
          PID:2408
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" winsock show catalog
          2⤵
            PID:1628
          • C:\Windows\SYSTEM32\makecab.exe
            "makecab.exe" /F "C:\Users\Admin\AppData\Local\Temp\iediag_makecab_directives.txt"
            2⤵
              PID:2304
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\vcredist2010_x64.log-MSI_vc_red.msi.txt
            1⤵
            • Opens file in notepad (likely ransom note)
            PID:4936
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:2916
            • C:\Windows\winhlp32.exe
              "C:\Windows\winhlp32.exe"
              1⤵
                PID:1128
              • C:\Windows\helppane.exe
                C:\Windows\helppane.exe -Embedding
                1⤵
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:3184
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                1⤵
                • Drops file in Windows directory
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:2404
              • C:\Windows\system32\browser_broker.exe
                C:\Windows\system32\browser_broker.exe -Embedding
                1⤵
                • Modifies Internet Explorer settings
                PID:3844
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Modifies registry class
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3740
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Drops file in Windows directory
                • Modifies Internet Explorer settings
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                PID:4180
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Drops file in Windows directory
                • Modifies registry class
                PID:1124
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Modifies registry class
                PID:216
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Modifies registry class
                PID:796
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Modifies registry class
                PID:4928
              • C:\Windows\hh.exe
                "C:\Windows\hh.exe"
                1⤵
                  PID:4372
                • C:\Windows\hh.exe
                  "C:\Windows\hh.exe"
                  1⤵
                    PID:2992
                  • C:\Windows\HelpPane.exe
                    "C:\Windows\HelpPane.exe"
                    1⤵
                      PID:3672
                    • C:\Windows\HelpPane.exe
                      "C:\Windows\HelpPane.exe"
                      1⤵
                        PID:4692
                      • C:\Windows\explorer.exe
                        "C:\Windows\explorer.exe"
                        1⤵
                          PID:432
                        • C:\Windows\sysmon.exe
                          "C:\Windows\sysmon.exe"
                          1⤵
                            PID:4148
                          • C:\Windows\sysmon.exe
                            "C:\Windows\sysmon.exe"
                            1⤵
                              PID:4492
                            • C:\Windows\splwow64.exe
                              "C:\Windows\splwow64.exe"
                              1⤵
                                PID:96
                              • C:\Windows\system32\cmd.exe
                                "C:\Windows\system32\cmd.exe"
                                1⤵
                                • Suspicious use of WriteProcessMemory
                                PID:4152
                                • C:\Windows\system32\rundll32.exe
                                  rundll32 adhapi
                                  2⤵
                                    PID:760
                                  • C:\Windows\system32\rundll32.exe
                                    rundll32 appmgr.dll
                                    2⤵
                                      PID:3544
                                    • C:\Windows\system32\rundll32.exe
                                      rundll32 appmgr.dll
                                      2⤵
                                        PID:4176
                                      • C:\Windows\system32\rundll32.exe
                                        rundll32 AppResolver.dll
                                        2⤵
                                          PID:2512
                                        • C:\Windows\system32\autochk.exe
                                          autochk
                                          2⤵
                                            PID:1120
                                        • C:\Windows\System32\acu.exe
                                          "C:\Windows\System32\acu.exe" C:\Windows\System32\ActivationManager.dll
                                          1⤵
                                            PID:3704
                                          • C:\Windows\System32\acu.exe
                                            "C:\Windows\System32\acu.exe"
                                            1⤵
                                              PID:1444
                                            • C:\Windows\System32\acu.exe
                                              "C:\Windows\System32\acu.exe"
                                              1⤵
                                                PID:1944
                                              • C:\Windows\System32\alg.exe
                                                "C:\Windows\System32\alg.exe"
                                                1⤵
                                                  PID:4592
                                                • C:\Windows\System32\alg.exe
                                                  "C:\Windows\System32\alg.exe"
                                                  1⤵
                                                    PID:4828
                                                  • C:\Windows\System32\AgentService.exe
                                                    "C:\Windows\System32\AgentService.exe"
                                                    1⤵
                                                      PID:3172
                                                    • C:\Windows\System32\aitstatic.exe
                                                      "C:\Windows\System32\aitstatic.exe"
                                                      1⤵
                                                        PID:4684
                                                      • C:\Windows\System32\aitstatic.exe
                                                        "C:\Windows\System32\aitstatic.exe"
                                                        1⤵
                                                          PID:3728
                                                        • C:\Windows\System32\aitstatic.exe
                                                          "C:\Windows\System32\aitstatic.exe"
                                                          1⤵
                                                            PID:2108
                                                          • C:\Windows\System32\alg.exe
                                                            "C:\Windows\System32\alg.exe"
                                                            1⤵
                                                              PID:4500
                                                            • C:\Windows\System32\alg.exe
                                                              "C:\Windows\System32\alg.exe"
                                                              1⤵
                                                                PID:3820
                                                              • C:\Windows\System32\alg.exe
                                                                "C:\Windows\System32\alg.exe"
                                                                1⤵
                                                                  PID:1692
                                                                • C:\Windows\System32\alg.exe
                                                                  "C:\Windows\System32\alg.exe"
                                                                  1⤵
                                                                    PID:3336
                                                                  • C:\Windows\System32\appidpolicyconverter.exe
                                                                    "C:\Windows\System32\appidpolicyconverter.exe"
                                                                    1⤵
                                                                      PID:2936
                                                                    • C:\Windows\System32\appidpolicyconverter.exe
                                                                      "C:\Windows\System32\appidpolicyconverter.exe"
                                                                      1⤵
                                                                        PID:1848
                                                                      • C:\Windows\System32\appidcertstorecheck.exe
                                                                        "C:\Windows\System32\appidcertstorecheck.exe"
                                                                        1⤵
                                                                          PID:4196
                                                                        • C:\Windows\System32\appidcertstorecheck.exe
                                                                          "C:\Windows\System32\appidcertstorecheck.exe"
                                                                          1⤵
                                                                            PID:4852
                                                                          • C:\Windows\System32\AppHostRegistrationVerifier.exe
                                                                            "C:\Windows\System32\AppHostRegistrationVerifier.exe"
                                                                            1⤵
                                                                            • Modifies registry class
                                                                            PID:4728
                                                                          • C:\Windows\System32\AppHostRegistrationVerifier.exe
                                                                            "C:\Windows\System32\AppHostRegistrationVerifier.exe"
                                                                            1⤵
                                                                              PID:3276
                                                                            • C:\Windows\System32\AppHostRegistrationVerifier.exe
                                                                              "C:\Windows\System32\AppHostRegistrationVerifier.exe"
                                                                              1⤵
                                                                              • Modifies registry class
                                                                              PID:2776
                                                                            • C:\Windows\System32\AppHostRegistrationVerifier.exe
                                                                              "C:\Windows\System32\AppHostRegistrationVerifier.exe"
                                                                              1⤵
                                                                              • Modifies registry class
                                                                              PID:1248
                                                                            • C:\Windows\System32\appidtel.exe
                                                                              "C:\Windows\System32\appidtel.exe"
                                                                              1⤵
                                                                                PID:4280
                                                                              • C:\Windows\System32\appidtel.exe
                                                                                "C:\Windows\System32\appidtel.exe"
                                                                                1⤵
                                                                                  PID:2448
                                                                                • C:\Windows\System32\ApplicationFrameHost.exe
                                                                                  "C:\Windows\System32\ApplicationFrameHost.exe"
                                                                                  1⤵
                                                                                    PID:2940
                                                                                  • C:\Windows\System32\ApplySettingsTemplateCatalog.exe
                                                                                    "C:\Windows\System32\ApplySettingsTemplateCatalog.exe"
                                                                                    1⤵
                                                                                      PID:1296
                                                                                    • C:\Windows\System32\ApplySettingsTemplateCatalog.exe
                                                                                      "C:\Windows\System32\ApplySettingsTemplateCatalog.exe"
                                                                                      1⤵
                                                                                        PID:4428
                                                                                      • C:\Windows\System32\ApplySettingsTemplateCatalog.exe
                                                                                        "C:\Windows\System32\ApplySettingsTemplateCatalog.exe"
                                                                                        1⤵
                                                                                          PID:2572
                                                                                        • C:\Windows\System32\ApplySettingsTemplateCatalog.exe
                                                                                          "C:\Windows\System32\ApplySettingsTemplateCatalog.exe"
                                                                                          1⤵
                                                                                            PID:4840
                                                                                          • C:\Windows\System32\ApproveChildRequest.exe
                                                                                            "C:\Windows\System32\ApproveChildRequest.exe"
                                                                                            1⤵
                                                                                              PID:4224
                                                                                            • C:\Windows\System32\ApproveChildRequest.exe
                                                                                              "C:\Windows\System32\ApproveChildRequest.exe"
                                                                                              1⤵
                                                                                                PID:1428
                                                                                              • C:\Windows\System32\ApproveChildRequest.exe
                                                                                                "C:\Windows\System32\ApproveChildRequest.exe"
                                                                                                1⤵
                                                                                                  PID:4276
                                                                                                • C:\Windows\System32\ApproveChildRequest.exe
                                                                                                  "C:\Windows\System32\ApproveChildRequest.exe"
                                                                                                  1⤵
                                                                                                    PID:3444
                                                                                                  • C:\Windows\System32\ApproveChildRequest.exe
                                                                                                    "C:\Windows\System32\ApproveChildRequest.exe"
                                                                                                    1⤵
                                                                                                      PID:5004
                                                                                                    • C:\Windows\System32\AppVClient.exe
                                                                                                      "C:\Windows\System32\AppVClient.exe"
                                                                                                      1⤵
                                                                                                        PID:888
                                                                                                      • C:\Windows\System32\AppVClient.exe
                                                                                                        "C:\Windows\System32\AppVClient.exe"
                                                                                                        1⤵
                                                                                                          PID:3360
                                                                                                        • C:\Windows\System32\autochk.exe
                                                                                                          "C:\Windows\System32\autochk.exe"
                                                                                                          1⤵
                                                                                                            PID:3372
                                                                                                          • C:\Windows\System32\autoconv.exe
                                                                                                            "C:\Windows\System32\autoconv.exe"
                                                                                                            1⤵
                                                                                                              PID:2868
                                                                                                            • C:\Windows\System32\autofmt.exe
                                                                                                              "C:\Windows\System32\autofmt.exe"
                                                                                                              1⤵
                                                                                                                PID:4136
                                                                                                              • C:\Windows\System32\AxInstUI.exe
                                                                                                                "C:\Windows\System32\AxInstUI.exe"
                                                                                                                1⤵
                                                                                                                  PID:2120
                                                                                                                • C:\Windows\System32\AxInstUI.exe
                                                                                                                  "C:\Windows\System32\AxInstUI.exe"
                                                                                                                  1⤵
                                                                                                                    PID:1300
                                                                                                                  • C:\Windows\System32\AxInstUI.exe
                                                                                                                    "C:\Windows\System32\AxInstUI.exe"
                                                                                                                    1⤵
                                                                                                                      PID:972
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k SDRSVC
                                                                                                                      1⤵
                                                                                                                        PID:2948
                                                                                                                      • C:\Windows\system32\mmc.exe
                                                                                                                        "C:\Windows\system32\mmc.exe" "C:\Windows\System32\azman.msc"
                                                                                                                        1⤵
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                        PID:4992
                                                                                                                      • C:\Windows\System32\baaupdate.exe
                                                                                                                        "C:\Windows\System32\baaupdate.exe"
                                                                                                                        1⤵
                                                                                                                          PID:3988
                                                                                                                        • C:\Windows\System32\baaupdate.exe
                                                                                                                          "C:\Windows\System32\baaupdate.exe"
                                                                                                                          1⤵
                                                                                                                            PID:5044
                                                                                                                          • C:\Windows\System32\baaupdate.exe
                                                                                                                            "C:\Windows\System32\baaupdate.exe"
                                                                                                                            1⤵
                                                                                                                              PID:3820
                                                                                                                            • C:\Windows\System32\baaupdate.exe
                                                                                                                              "C:\Windows\System32\baaupdate.exe"
                                                                                                                              1⤵
                                                                                                                                PID:2276
                                                                                                                              • C:\Windows\System32\backgroundTaskHost.exe
                                                                                                                                "C:\Windows\System32\backgroundTaskHost.exe"
                                                                                                                                1⤵
                                                                                                                                  PID:3336
                                                                                                                                • C:\Windows\System32\backgroundTaskHost.exe
                                                                                                                                  "C:\Windows\System32\backgroundTaskHost.exe"
                                                                                                                                  1⤵
                                                                                                                                    PID:1892
                                                                                                                                  • C:\Windows\System32\BackgroundTransferHost.exe
                                                                                                                                    "C:\Windows\System32\BackgroundTransferHost.exe"
                                                                                                                                    1⤵
                                                                                                                                      PID:1316
                                                                                                                                    • C:\Windows\System32\BackgroundTransferHost.exe
                                                                                                                                      "C:\Windows\System32\BackgroundTransferHost.exe"
                                                                                                                                      1⤵
                                                                                                                                        PID:1372
                                                                                                                                      • C:\Windows\System32\backgroundTaskHost.exe
                                                                                                                                        "C:\Windows\System32\backgroundTaskHost.exe"
                                                                                                                                        1⤵
                                                                                                                                          PID:3848
                                                                                                                                        • C:\Windows\System32\baaupdate.exe
                                                                                                                                          "C:\Windows\System32\baaupdate.exe"
                                                                                                                                          1⤵
                                                                                                                                            PID:4004
                                                                                                                                          • C:\Windows\System32\AxInstUI.exe
                                                                                                                                            "C:\Windows\System32\AxInstUI.exe"
                                                                                                                                            1⤵
                                                                                                                                              PID:4196
                                                                                                                                            • C:\Windows\System32\bcastdvr.exe
                                                                                                                                              "C:\Windows\System32\bcastdvr.exe"
                                                                                                                                              1⤵
                                                                                                                                              • Checks processor information in registry
                                                                                                                                              PID:4524
                                                                                                                                            • C:\Windows\System32\bcdedit.exe
                                                                                                                                              "C:\Windows\System32\bcdedit.exe"
                                                                                                                                              1⤵
                                                                                                                                                PID:424
                                                                                                                                              • C:\Windows\System32\bcdboot.exe
                                                                                                                                                "C:\Windows\System32\bcdboot.exe"
                                                                                                                                                1⤵
                                                                                                                                                  PID:1124
                                                                                                                                                • C:\Windows\System32\bcdboot.exe
                                                                                                                                                  "C:\Windows\System32\bcdboot.exe"
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2088
                                                                                                                                                  • C:\Windows\System32\bcdboot.exe
                                                                                                                                                    "C:\Windows\System32\bcdboot.exe"
                                                                                                                                                    1⤵
                                                                                                                                                      PID:2240
                                                                                                                                                    • C:\Windows\System32\bdechangepin.exe
                                                                                                                                                      "C:\Windows\System32\bdechangepin.exe"
                                                                                                                                                      1⤵
                                                                                                                                                        PID:4664
                                                                                                                                                      • C:\Windows\System32\BdeHdCfg.exe
                                                                                                                                                        "C:\Windows\System32\BdeHdCfg.exe"
                                                                                                                                                        1⤵
                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                        PID:4276
                                                                                                                                                      • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                                                        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                                                                                                                                        1⤵
                                                                                                                                                          PID:3636
                                                                                                                                                        • C:\Windows\System32\BitLockerWizardElev.exe
                                                                                                                                                          "C:\Windows\System32\BitLockerWizardElev.exe" \\?\Volume{e9e35ac9-0000-0000-0000-d01200000000}\ T
                                                                                                                                                          1⤵
                                                                                                                                                            PID:976
                                                                                                                                                          • C:\Windows\System32\setspn.exe
                                                                                                                                                            "C:\Windows\System32\setspn.exe"
                                                                                                                                                            1⤵
                                                                                                                                                              PID:3716
                                                                                                                                                            • C:\Windows\System32\setspn.exe
                                                                                                                                                              "C:\Windows\System32\setspn.exe"
                                                                                                                                                              1⤵
                                                                                                                                                                PID:224
                                                                                                                                                              • C:\Windows\System32\setspn.exe
                                                                                                                                                                "C:\Windows\System32\setspn.exe"
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:3148

                                                                                                                                                                Network

                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                Replay Monitor

                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                Downloads

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\acu.exe.log

                                                                                                                                                                  Filesize

                                                                                                                                                                  42B

                                                                                                                                                                  MD5

                                                                                                                                                                  84cfdb4b995b1dbf543b26b86c863adc

                                                                                                                                                                  SHA1

                                                                                                                                                                  d2f47764908bf30036cf8248b9ff5541e2711fa2

                                                                                                                                                                  SHA256

                                                                                                                                                                  d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b

                                                                                                                                                                  SHA512

                                                                                                                                                                  485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DNDP7OJQ\edgecompatviewlist[1].xml

                                                                                                                                                                  Filesize

                                                                                                                                                                  74KB

                                                                                                                                                                  MD5

                                                                                                                                                                  d4fc49dc14f63895d997fa4940f24378

                                                                                                                                                                  SHA1

                                                                                                                                                                  3efb1437a7c5e46034147cbbc8db017c69d02c31

                                                                                                                                                                  SHA256

                                                                                                                                                                  853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                                                                                                                                                  SHA512

                                                                                                                                                                  cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\ZVUBGSID\support.microsoft[1].xml

                                                                                                                                                                  Filesize

                                                                                                                                                                  13B

                                                                                                                                                                  MD5

                                                                                                                                                                  c1ddea3ef6bbef3e7060a1a9ad89e4c5

                                                                                                                                                                  SHA1

                                                                                                                                                                  35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                                                                                                                                                                  SHA256

                                                                                                                                                                  b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                                                                                                                                                                  SHA512

                                                                                                                                                                  6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\ZVUBGSID\support.microsoft[1].xml

                                                                                                                                                                  Filesize

                                                                                                                                                                  17B

                                                                                                                                                                  MD5

                                                                                                                                                                  3ff4d575d1d04c3b54f67a6310f2fc95

                                                                                                                                                                  SHA1

                                                                                                                                                                  1308937c1a46e6c331d5456bcd4b2182dc444040

                                                                                                                                                                  SHA256

                                                                                                                                                                  021a5868b6c9e8beba07848ba30586c693f87ac02ee2ccaa0f26b7163c0c6b44

                                                                                                                                                                  SHA512

                                                                                                                                                                  2b26501c4bf86ed66e941735c49ac445d683ad49ed94c5d87cc96228081ae2c8f4a8f44a2a5276b9f4b0962decfce6b9eeee38e42262ce8d865d5df0df7ec3d6

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\2540KTDI\favicon-32x32[1].png

                                                                                                                                                                  Filesize

                                                                                                                                                                  631B

                                                                                                                                                                  MD5

                                                                                                                                                                  fb2ed9313c602f40b7a2762acc15ff89

                                                                                                                                                                  SHA1

                                                                                                                                                                  8a390d07a8401d40cbc1a16d873911fa4cb463f5

                                                                                                                                                                  SHA256

                                                                                                                                                                  b241d02fab4b17291af37993eb249f9303eb5897610abafac4c9f6aa6a878369

                                                                                                                                                                  SHA512

                                                                                                                                                                  9cbcf5c7b8409494f6d543434ecaff42de8a2d0632a17931062d7d1cc130d43e61162eedb0965b545e65e0687ded4d4b51e29631568af34b157a7d02a3852508

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\PYMD2OKF\suggestions[1].en-US

                                                                                                                                                                  Filesize

                                                                                                                                                                  17KB

                                                                                                                                                                  MD5

                                                                                                                                                                  5a34cb996293fde2cb7a4ac89587393a

                                                                                                                                                                  SHA1

                                                                                                                                                                  3c96c993500690d1a77873cd62bc639b3a10653f

                                                                                                                                                                  SHA256

                                                                                                                                                                  c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                                                                                                                                  SHA512

                                                                                                                                                                  e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF9CF7A8B6D35AADA2.TMP

                                                                                                                                                                  Filesize

                                                                                                                                                                  20KB

                                                                                                                                                                  MD5

                                                                                                                                                                  10899dedece9876f6cf842303686c565

                                                                                                                                                                  SHA1

                                                                                                                                                                  0ee64e1c72d719d23f5204cc33d3955b7c4caab7

                                                                                                                                                                  SHA256

                                                                                                                                                                  fa6d05067aac40be6636bd3dc945685b62848313d54c0ab11d1e3c2b63417f32

                                                                                                                                                                  SHA512

                                                                                                                                                                  f346c99d5dd0bdd1a899dcb98fd1de1bb88ae2523a47c4eabe698a7dd546594439ad4a6e1b229d8e0f2b36e384c1e25cb39459a1dd570c6d101fa54e966d1455

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IEDiag.json

                                                                                                                                                                  Filesize

                                                                                                                                                                  24KB

                                                                                                                                                                  MD5

                                                                                                                                                                  1ed7e45c3a740289be52eaf765d7174c

                                                                                                                                                                  SHA1

                                                                                                                                                                  a490eb171afd26bd88d4cfa34253f8742e272112

                                                                                                                                                                  SHA256

                                                                                                                                                                  8c76f06d78f8e7a42e04bafbf3392ccc3b9ac3031b2bcb21528418b7ede56550

                                                                                                                                                                  SHA512

                                                                                                                                                                  7767e54a1ba79257bdd1420dae927f898f2a025f18d08ee5ad43e96cd297ca5050564d2b504a19442efb8113c10226bbac63c4b46141ed113201d4613243c094

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IEDiag.xml

                                                                                                                                                                  Filesize

                                                                                                                                                                  2.2MB

                                                                                                                                                                  MD5

                                                                                                                                                                  b64317c730818fc8859236ccd6396855

                                                                                                                                                                  SHA1

                                                                                                                                                                  d29a4a9dd6ffde9d388e1e1766cd1b82c2722466

                                                                                                                                                                  SHA256

                                                                                                                                                                  e63c6481ba97f0c04b5eacec9e48360cbf285c18164e28176a6031af9a09e547

                                                                                                                                                                  SHA512

                                                                                                                                                                  fb9545fe96bb104d36d333d7a2cd45479c3cc9f370d7a7b4b86c458b906691d22e1249d2fa0b2764b4517a76649bc798b80d68b0e5273459b492988e32f76309

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\dxdiag.xml

                                                                                                                                                                  Filesize

                                                                                                                                                                  171KB

                                                                                                                                                                  MD5

                                                                                                                                                                  c70cb1e9eb83dd32a8455972021e6321

                                                                                                                                                                  SHA1

                                                                                                                                                                  6808d88ab3a60f5436b3bcb0326e978bea4f3140

                                                                                                                                                                  SHA256

                                                                                                                                                                  32bd700c852e7bd9fc081a566ad720aedaac355a59e5e919604f7a5189ec2250

                                                                                                                                                                  SHA512

                                                                                                                                                                  b2c54e34df5beeaa8e7d8d7bee3d38bd7aa8eefe79837d4d2f6f1d3b696fc3d336e7663c5ba77c2c0702e197f60eb46adbaf0940a31e7cbe18a9e286551f43ae

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\iediag_makecab_directives.txt

                                                                                                                                                                  Filesize

                                                                                                                                                                  515B

                                                                                                                                                                  MD5

                                                                                                                                                                  14c148857af11ebcee263a2fb2b359ee

                                                                                                                                                                  SHA1

                                                                                                                                                                  710cb526ed69db7fdcc5da6b49241f70101e12fb

                                                                                                                                                                  SHA256

                                                                                                                                                                  810a37010bd4e6eed276310610dc4ebc7cc91535edf65e6ba6d9ed6edbe793ac

                                                                                                                                                                  SHA512

                                                                                                                                                                  d47ff7bdb40d518cf8daed410f29fea0f990457ed2da25ff2840a3bdcda77abe0b1b9948198a105a217fadbd4e4eed80fd0eb4338db7202892b9b4b910189e12

                                                                                                                                                                • memory/1124-424-0x0000025C36B30000-0x0000025C36B32000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-452-0x0000025C35AF0000-0x0000025C35AF2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-620-0x0000025C326E0000-0x0000025C326F0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/1124-619-0x0000025C326E0000-0x0000025C326F0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/1124-618-0x0000025C326E0000-0x0000025C326F0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/1124-616-0x0000025C326E0000-0x0000025C326F0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/1124-615-0x0000025C326E0000-0x0000025C326F0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/1124-614-0x0000025C326E0000-0x0000025C326F0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/1124-264-0x0000025C33700000-0x0000025C33800000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1024KB

                                                                                                                                                                • memory/1124-293-0x0000025C35BA0000-0x0000025C35BA2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-301-0x0000025C35BE0000-0x0000025C35BE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-304-0x0000025C35C20000-0x0000025C35C22000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-308-0x0000025C35DA0000-0x0000025C35DA2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-313-0x0000025C36000000-0x0000025C36002000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-317-0x0000025C36020000-0x0000025C36022000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-320-0x0000025C360E0000-0x0000025C360E2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-613-0x0000025C326E0000-0x0000025C326F0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/1124-352-0x0000025C36820000-0x0000025C36840000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  128KB

                                                                                                                                                                • memory/1124-376-0x0000025C37300000-0x0000025C37400000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1024KB

                                                                                                                                                                • memory/1124-380-0x0000025C36C00000-0x0000025C36C20000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  128KB

                                                                                                                                                                • memory/1124-409-0x0000025C20300000-0x0000025C20400000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1024KB

                                                                                                                                                                • memory/1124-586-0x0000025C37060000-0x0000025C37062000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-583-0x0000025C36FE0000-0x0000025C36FE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-526-0x0000025C382D0000-0x0000025C383D0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1024KB

                                                                                                                                                                • memory/1124-435-0x0000025C36EB0000-0x0000025C36EB2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1124-499-0x0000025C382D0000-0x0000025C383D0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1024KB

                                                                                                                                                                • memory/1124-453-0x0000025C36E20000-0x0000025C36E40000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  128KB

                                                                                                                                                                • memory/1124-467-0x0000025C381D0000-0x0000025C382D0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1024KB

                                                                                                                                                                • memory/1124-460-0x0000025C35B40000-0x0000025C35B42000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/1444-1269-0x00007FF83D9F0000-0x00007FF83E3DC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  9.9MB

                                                                                                                                                                • memory/1444-1266-0x00007FF83D9F0000-0x00007FF83E3DC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  9.9MB

                                                                                                                                                                • memory/1944-1270-0x00007FF83D9F0000-0x00007FF83E3DC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  9.9MB

                                                                                                                                                                • memory/1944-1267-0x00007FF83D9F0000-0x00007FF83E3DC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  9.9MB

                                                                                                                                                                • memory/2404-129-0x000002123BB00000-0x000002123BB10000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/2404-437-0x0000021241EA0000-0x0000021241EA1000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4KB

                                                                                                                                                                • memory/2404-439-0x0000021241EB0000-0x0000021241EB1000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4KB

                                                                                                                                                                • memory/2404-148-0x000002123C0F0000-0x000002123C0F2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                • memory/2760-52-0x00007FF83EAC0000-0x00007FF83F4AC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  9.9MB

                                                                                                                                                                • memory/2760-9-0x000002A49B2B0000-0x000002A49B2C0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/2760-77-0x000002A49B2B0000-0x000002A49B2C0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/2760-76-0x000002A49B2B0000-0x000002A49B2C0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/2760-25-0x000002A4B6C40000-0x000002A4B7166000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.1MB

                                                                                                                                                                • memory/2760-7-0x000002A49B2B0000-0x000002A49B2C0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/2760-6-0x00007FF83EAC0000-0x00007FF83F4AC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  9.9MB

                                                                                                                                                                • memory/2760-3-0x00007FF6CDA60000-0x00007FF6CDAE4000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  528KB

                                                                                                                                                                • memory/2760-112-0x00007FF83EAC0000-0x00007FF83F4AC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  9.9MB

                                                                                                                                                                • memory/2760-10-0x000002A49B2B0000-0x000002A49B2C0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/2760-13-0x000002A4B6540000-0x000002A4B6702000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.8MB

                                                                                                                                                                • memory/2760-80-0x000002A49B2B0000-0x000002A49B2C0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/2760-14-0x000002A49B2B0000-0x000002A49B2C0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/2760-79-0x000002A49B2B0000-0x000002A49B2C0000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                • memory/3704-1268-0x00007FF83D9F0000-0x00007FF83E3DC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  9.9MB

                                                                                                                                                                • memory/3704-1263-0x00007FF83D9F0000-0x00007FF83E3DC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  9.9MB

                                                                                                                                                                • memory/3704-1262-0x000001C4C1C20000-0x000001C4C1C2C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  48KB