Analysis

  • max time kernel
    103s
  • max time network
    154s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    04-11-2024 03:34

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • MD5

    f5b93af3ee1b64dacd2bac9ba4af9b27

  • SHA1

    1f2a038199a71a2b917dca4dff2f5fac5e840978

  • SHA256

    48d4fde21b28f0614fdf124f83f5594bddc13292f21b775da58b017385a49b01

  • SHA512

    83703b0f567723abe3d6b34bd419be5df3475e049ae8893993fec017da9a420cd875184c570bdffbfc0bccac662762991885dea8ebcc2af172b3aac2fb00a302

  • SSDEEP

    49152:mv2I22SsaNYfdPBldt698dBcjHQzRJ6TbR3LoGd/oobTHHB72eh2NT:mvb22SsaNYfdPBldt6+dBcjHQzRJ6FA

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

Inversin-43597.portmap.host:43597

Mutex

80329fd2-f063-4b06-9c7e-8dbc6278c2a3

Attributes
  • encryption_key

    744EA1A385FEBC6DA96387411B7000D77E66B075

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    java updater

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4212
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4756
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2432
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\AddEdit.png"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4696
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n /f "C:\Users\Admin\AppData\Roaming\ApproveInvoke.dotm"
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:884
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\BackupInvoke.ini
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2676
      • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\AppData\Roaming\ClearUninstall.ppsx" /ou ""
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:216
      • C:\Windows\System32\notepad.exe
        "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Roaming\CopyJoin.ps1"
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1704
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -nohome
        3⤵
          PID:3964
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3964 CREDAT:17410 /prefetch:2
            4⤵
              PID:4668
          • C:\Windows\system32\mspaint.exe
            "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\RegisterUndo.jpeg"
            3⤵
              PID:3680
            • C:\Program Files\VideoLAN\VLC\vlc.exe
              "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\RestoreAssert.asf"
              3⤵
                PID:644
              • C:\Windows\system32\mspaint.exe
                "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\SkipUnregister.gif"
                3⤵
                  PID:3144
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\StepRestore.cmd" "
                  3⤵
                    PID:4480
                  • C:\Windows\system32\mspaint.exe
                    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\StepShow.dib"
                    3⤵
                      PID:3560
                    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\SuspendRead.rtf" /o ""
                      3⤵
                        PID:3552
                      • C:\Windows\system32\mspaint.exe
                        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\TraceInstall.wmf"
                        3⤵
                          PID:3316
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\TraceMeasure.html
                          3⤵
                            PID:5176
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x104,0x130,0x7ffa897146f8,0x7ffa89714708,0x7ffa89714718
                              4⤵
                                PID:5248
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15126748570456872611,5818128138921015909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:2
                                4⤵
                                  PID:6000
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,15126748570456872611,5818128138921015909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:3
                                  4⤵
                                    PID:6020
                                • C:\Program Files\Internet Explorer\iexplore.exe
                                  "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Roaming\UndoStop.xsl
                                  3⤵
                                    PID:5324
                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5324 CREDAT:17410 /prefetch:2
                                      4⤵
                                        PID:5500
                                    • C:\Windows\System32\fontview.exe
                                      "C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Roaming\UnprotectRemove.otf
                                      3⤵
                                        PID:5392
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\UpdateDebug.htm
                                        3⤵
                                          PID:5876
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x130,0x134,0x138,0xc8,0x13c,0x7ffa897146f8,0x7ffa89714708,0x7ffa89714718
                                            4⤵
                                              PID:5936
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
                                              4⤵
                                                PID:5996
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
                                                4⤵
                                                  PID:5420
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3036 /prefetch:8
                                                  4⤵
                                                    PID:6288
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                                    4⤵
                                                      PID:6776
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                                      4⤵
                                                        PID:6784
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:1
                                                        4⤵
                                                          PID:6872
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                                                          4⤵
                                                            PID:6360
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:1
                                                            4⤵
                                                              PID:1456
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3980 /prefetch:8
                                                              4⤵
                                                                PID:5444
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                                                4⤵
                                                                  PID:6420
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff7f9e05460,0x7ff7f9e05470,0x7ff7f9e05480
                                                                    5⤵
                                                                      PID:6692
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3980 /prefetch:8
                                                                    4⤵
                                                                      PID:1540
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:1
                                                                      4⤵
                                                                        PID:4244
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5657368218220574154,610993385880618956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:1
                                                                        4⤵
                                                                          PID:2240
                                                                  • C:\Windows\system32\OpenWith.exe
                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                    1⤵
                                                                    • Modifies registry class
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:4408
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
                                                                    1⤵
                                                                      PID:2684
                                                                    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                                                      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
                                                                      1⤵
                                                                      • Enumerates connected drives
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of WriteProcessMemory
                                                                      PID:2636
                                                                      • C:\Windows\SysWOW64\unregmp2.exe
                                                                        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
                                                                        2⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:756
                                                                        • C:\Windows\system32\unregmp2.exe
                                                                          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
                                                                          3⤵
                                                                          • Enumerates connected drives
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3280
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
                                                                      1⤵
                                                                      • Drops file in Windows directory
                                                                      PID:708
                                                                    • C:\Windows\system32\OpenWith.exe
                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                      1⤵
                                                                        PID:3560
                                                                      • C:\Windows\system32\OpenWith.exe
                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                        1⤵
                                                                          PID:4024
                                                                        • C:\Windows\system32\OpenWith.exe
                                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                                          1⤵
                                                                            PID:1728
                                                                          • C:\Windows\system32\OpenWith.exe
                                                                            C:\Windows\system32\OpenWith.exe -Embedding
                                                                            1⤵
                                                                              PID:460
                                                                            • C:\Windows\system32\OpenWith.exe
                                                                              C:\Windows\system32\OpenWith.exe -Embedding
                                                                              1⤵
                                                                                PID:1524
                                                                              • C:\Windows\system32\OpenWith.exe
                                                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                                                1⤵
                                                                                  PID:2840
                                                                                • C:\Windows\system32\AUDIODG.EXE
                                                                                  C:\Windows\system32\AUDIODG.EXE 0x3e4 0x2d4
                                                                                  1⤵
                                                                                    PID:5256
                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                    1⤵
                                                                                      PID:6608
                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                      1⤵
                                                                                        PID:5536

                                                                                      Network

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7EF516642261549A23D49DB36FFE5F3F_61FBF64E4C250562CDD1DE2D4EB32EE1

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        d93be4116de766e1851b695971ef2393

                                                                                        SHA1

                                                                                        b5e4735448fb0f16ef4422e53f3914489f8fc0c6

                                                                                        SHA256

                                                                                        2c2aa1e71979c4383542e81fc089812e41a2c0a5be33ff5d41f01d72650a64d7

                                                                                        SHA512

                                                                                        6fb1f6eb82b3440e7bed2d547abbf30444fa09f9b6e48aabdbe3dd80a414d682182314db4594f54d9c6dcfb891f5f99fb9f04be888b27253f3e9cb29801ce565

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

                                                                                        Filesize

                                                                                        471B

                                                                                        MD5

                                                                                        8a30a9b50fedce017b52120d4343b95a

                                                                                        SHA1

                                                                                        8de5de177d1008f9667108f6b5802a2a52b88a88

                                                                                        SHA256

                                                                                        4550fdafe58e9e306e641eefdb4bfd0a0f560bad671dfe5730a4ef029b3ffb3d

                                                                                        SHA512

                                                                                        7edf4b47f415103805bf251adb8e135398ca632eced27d87ee5d40f8854edc7bdf06e84173ed537791dd0a56554d6e692e500274f991bec08d408f9dc73cbab1

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                                                        Filesize

                                                                                        471B

                                                                                        MD5

                                                                                        b4c368f8851eec362f9bab6aa80623da

                                                                                        SHA1

                                                                                        1960934afb425ff73c3b6546f307e74e64f343ff

                                                                                        SHA256

                                                                                        9009daecfdb4168f9c167f4742b4f99e650ab1f967f98424d1a3e688f18389c1

                                                                                        SHA512

                                                                                        2388b164753293d451f7acb162234f15071718f97f5cb340ef3616b81f418a77e3edf8031222861a84aacd3d4e528308c8c5e150fbdbb48b1421edab2d95e723

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7EF516642261549A23D49DB36FFE5F3F_61FBF64E4C250562CDD1DE2D4EB32EE1

                                                                                        Filesize

                                                                                        564B

                                                                                        MD5

                                                                                        48303404955350f66314fd6d90c3b516

                                                                                        SHA1

                                                                                        04fbb379a59d1d054b0a708444203bb870941282

                                                                                        SHA256

                                                                                        2eda4540a99112e28788e522c76b84b59bc4da47b7025f56cfdb11e269084d97

                                                                                        SHA512

                                                                                        43ecd0b43c18c97e4e25a0f1175924f721089a8830af425c84473ef8b5790ba4220414a380ba3ba85d295a5302eb0a73f6b710f2373072faf8a031e9755362eb

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

                                                                                        Filesize

                                                                                        412B

                                                                                        MD5

                                                                                        acebd4b60e4762f00c3a188c00ec57f0

                                                                                        SHA1

                                                                                        d0f662b43e409e834afb8c6182a65aa9fccdc2a5

                                                                                        SHA256

                                                                                        0b241fbc20a1bd13a681f5c6fcb287554d8d0a6dc3133a2213114dc41de1a8bf

                                                                                        SHA512

                                                                                        5c1517bf323196749397c61208e8afe0836789f4f33500ab064282f5fd60fddf8143e00522e3030e7cc74c1a1973f2dec4ea0a5afbcd9182ad8ab1a74e1d003e

                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                                                        Filesize

                                                                                        420B

                                                                                        MD5

                                                                                        4e75dc6ddef26401f316ea8f706b43b0

                                                                                        SHA1

                                                                                        d7cafe946ba418fc6ca38b59d96ca92ff146a083

                                                                                        SHA256

                                                                                        c3cf3ff41034a0a0568915c51e4c8da2c0827b248f8026d9a374d2a9814611ab

                                                                                        SHA512

                                                                                        f1d6ba433007bc978423b4aec1b5af278f35c1f35fa9d682fde7480817839ff534d590c93d50e18cb22448e26ac07b1a256b7bf61c9d29b933a29a46ffb2a8a2

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                        Filesize

                                                                                        152B

                                                                                        MD5

                                                                                        e87625b4a77de67df5a963bf1f1b9f24

                                                                                        SHA1

                                                                                        727c79941debbd77b12d0a016164bae1dd3f127c

                                                                                        SHA256

                                                                                        07ecc7bd328990f44b189112a1a738861b0f4528097d4371e1ab0c46d8819f4e

                                                                                        SHA512

                                                                                        000d74220ba78628b727441c1b3f8813eec7fc97ff9aa6963eb2ab08d09525fa03935b32e86458c42e573b828a22b0b229af02b47eee511dc83de4ed3b5e726b

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                        Filesize

                                                                                        152B

                                                                                        MD5

                                                                                        5d9c9a841c4d3c390d06a3cc8d508ae6

                                                                                        SHA1

                                                                                        052145bf6c75ab8d907fc83b33ef0af2173a313f

                                                                                        SHA256

                                                                                        915ea0e3e872d2b2e7d0e0ca30f282675139c787fec8043a6e92b9ef68b4f67d

                                                                                        SHA512

                                                                                        8243684857e1c359872b8e795a0e5f2ee56b0c0c1e1c7e5d264c2c28476e9830981bb95244f44c3b2ed334c3e1228f3d6245cce2f3d1f34cdbce8e2af55b4c85

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                        Filesize

                                                                                        70KB

                                                                                        MD5

                                                                                        e5e3377341056643b0494b6842c0b544

                                                                                        SHA1

                                                                                        d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                                                        SHA256

                                                                                        e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                                                        SHA512

                                                                                        83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                        Filesize

                                                                                        111B

                                                                                        MD5

                                                                                        285252a2f6327d41eab203dc2f402c67

                                                                                        SHA1

                                                                                        acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                        SHA256

                                                                                        5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                        SHA512

                                                                                        11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                        Filesize

                                                                                        5KB

                                                                                        MD5

                                                                                        df56e91a9baa77437f153babcb662523

                                                                                        SHA1

                                                                                        a4b2b3eaf5e245d668963890b657a48e8d234d64

                                                                                        SHA256

                                                                                        edcfcaaeebe7d7a2b58c7c6e07e9595ec64cfbc85210fdda4f842cf94ceffd4b

                                                                                        SHA512

                                                                                        89fd604c95f6d53a8a8030f5f94de75a635ee9db1e66cd777ba4fdf783c6f93c8789b9e6a35c945bc732a5fd15337407eb8bf76ebec9b516b51160a0b5c66898

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                        Filesize

                                                                                        4KB

                                                                                        MD5

                                                                                        46da169bb5f944fd6d8ba3cc390cc886

                                                                                        SHA1

                                                                                        cc9c49d41fa0ed7be5108300c62251c9c3185359

                                                                                        SHA256

                                                                                        21d4bd515856639571956a6b79af586eef39ecca4b64d8c70f1ba45412a870da

                                                                                        SHA512

                                                                                        a4926d7a48100cfefd79a31779561291d4c904e620c5aeff838a0cc589cd1fe8104b521bee510d34fa6a463004b72418b360b09b4d5c21452778b9c7a95867e4

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                        Filesize

                                                                                        24KB

                                                                                        MD5

                                                                                        137094a3453899bc0bc86df52edd9186

                                                                                        SHA1

                                                                                        66bc2c2b45b63826bb233156bab8ce31c593ba99

                                                                                        SHA256

                                                                                        72d823cac2d49660cdd20ebf4d3ac222c4dd15aae6e5ac4a64f993ef5c4fdd44

                                                                                        SHA512

                                                                                        f8f149c9eab06e8d7e1aa62145f0fc588dc36fc521ef4dceceb80a191b72d79586d920feb5f3b1d19595109cc6d608c143e32f521a4da1068c708a2538899ada

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                        Filesize

                                                                                        24KB

                                                                                        MD5

                                                                                        364592d2cc18adf665987584bf528cba

                                                                                        SHA1

                                                                                        d1225b2b8ee4038b0c42229833acc543deeab0f6

                                                                                        SHA256

                                                                                        bd97dd6797bb763681cfb1fc3cc21a44a273aab1d9a4f4f9332675c662d2136c

                                                                                        SHA512

                                                                                        0e852db825e451464cbcfda95eae2dfe780874bd20e7b467604962428007d1735ece752aa5901d468708a68d66d029271d5567b39c530d2d44b875abbff9aa40

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\MANIFEST-000001

                                                                                        Filesize

                                                                                        41B

                                                                                        MD5

                                                                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                        SHA1

                                                                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                        SHA256

                                                                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                        SHA512

                                                                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                        Filesize

                                                                                        16B

                                                                                        MD5

                                                                                        206702161f94c5cd39fadd03f4014d98

                                                                                        SHA1

                                                                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                        SHA256

                                                                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                        SHA512

                                                                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                                                                        Filesize

                                                                                        16B

                                                                                        MD5

                                                                                        46295cac801e5d4857d09837238a6394

                                                                                        SHA1

                                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                        SHA256

                                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                        SHA512

                                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                        Filesize

                                                                                        8KB

                                                                                        MD5

                                                                                        5e7c9055e0dc5d6ab5c1d47f1cc27302

                                                                                        SHA1

                                                                                        ee7b7cd566869169ac37461cf9af556809feb7f4

                                                                                        SHA256

                                                                                        4e0e900bbc0a0a39bb0606d95409e0ec359319fa72ef170a1143d93e0d830052

                                                                                        SHA512

                                                                                        c4e7f34fdb85b189e51cbdff22419051aa26b956de51c5dbc5aeaaad25a0bf80ab6bb28699a71a099847b89487c4bdf8cf48786a58a06a926abb2ef6f0f65a31

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                        Filesize

                                                                                        10KB

                                                                                        MD5

                                                                                        50a084e44944b2031dcecfb0f4315a11

                                                                                        SHA1

                                                                                        2697ddb7988b64a9c76bc684e0ab92d35bed3028

                                                                                        SHA256

                                                                                        4e1bbce6fe7252706931488e4f3693db930eadfb11422ea4c4dd1419f9ed588d

                                                                                        SHA512

                                                                                        fd21bab041738f17a33644d74a81746255709a6cd1e6d5bf1f30feebf43bb3c78738108b914d295df701f5f6e031f1f3f9c48b3fb64fba47afd867435699c1bf

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        6c36c163d863997bb12b70b8e8347604

                                                                                        SHA1

                                                                                        5918e662a76713bf4056f3b576a7d80f0caa5ed0

                                                                                        SHA256

                                                                                        e83630dad6de593a5f4aad9106f7f382f484675aef8b5d3707998fb47022431a

                                                                                        SHA512

                                                                                        4aea6a97de01d73511a5b5195b8c21f2409478f9f4182b1275a246bf2abd52db2ebfa14bd85abe9274b77664b88960bea8be34ec712a71c4cea0e5f576ce0ffa

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F286C1F2-9A5D-11EF-96B2-D2E6B09CCA5E}.dat

                                                                                        Filesize

                                                                                        5KB

                                                                                        MD5

                                                                                        0c95cbf262381729929003f9e8e5490b

                                                                                        SHA1

                                                                                        799df65a465ed1ec0dd11f709b3f07053adc328d

                                                                                        SHA256

                                                                                        af1918352a3ad61d1894663b6fd0bd897f5473725abefbd6cdf8fbe3edf1b4f7

                                                                                        SHA512

                                                                                        00b7a697f2952c9a5878a6c89f835535686468dd85e81b6fcd9a831c4383c72e6c869935196c353777dda262fd0fa024999df63384e2522e1f93975d414538cf

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                                        Filesize

                                                                                        896KB

                                                                                        MD5

                                                                                        9089c5c8b4eafd9bfb73e3be0d1ff7e0

                                                                                        SHA1

                                                                                        6599474d13a9c792cb78dc689790df565935bcbf

                                                                                        SHA256

                                                                                        2d48f7b2dfbb2cba93b92bd26d054e4567e90f2b61f931a950a3045bc65fb761

                                                                                        SHA512

                                                                                        238aff71eda9d786e08ec4dd5c2b432d68785ae10d662cce7195cf37a2c5400ed523e59354a7aaf6ca1b588c0f7678185c5748cafa09b748ef5287a811fdfb9c

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                                        Filesize

                                                                                        1024KB

                                                                                        MD5

                                                                                        ee141df87d572b7d7d604be1c01528cd

                                                                                        SHA1

                                                                                        cd4ff5ebe7531ac5cac930fa2761ab6c8ad3e904

                                                                                        SHA256

                                                                                        40e114c347fd2981e632d3e8419b96f24d1e071f9d6cd50d53150247655724da

                                                                                        SHA512

                                                                                        b6f031d35e1f076930c5e489ea68a743ba290e9e16f0526c2a7c76f32ec159eaa628059b0b4f3de7d57484f166f8bd63fea03656b5e23c3e5f19264466cd283a

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\BA82CC69-63A7-475F-90A4-EFC35CF2C13F

                                                                                        Filesize

                                                                                        174KB

                                                                                        MD5

                                                                                        04f4603517c8e150310863e650bfd4d7

                                                                                        SHA1

                                                                                        bcb084dfaa57db7600402371688515d1a4b0b42a

                                                                                        SHA256

                                                                                        b9ad6056cc6850ba9930145cc7b00b4198c0cdc708a9a3a07d9d6e1fd12fef87

                                                                                        SHA512

                                                                                        214b98f5d0dccc702a1db3fdfa67a0dd38a52dc0932bc1df7c590080c5a3be2b4e78cdd6309ede336bc7a7fa32103c233a1700d04ca2552667487a0b3b875e53

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\winword.exe.db-wal

                                                                                        Filesize

                                                                                        8KB

                                                                                        MD5

                                                                                        5d4af1e3a61955142979ae38d0d82880

                                                                                        SHA1

                                                                                        b17832a356c6a855c68bc738e0d3a2f522b9a9b0

                                                                                        SHA256

                                                                                        868c16c567b858001f7c86a92f61020209d9bdd8058041140755622619046c2d

                                                                                        SHA512

                                                                                        853bd1a3f80356c451a10e834f77ed9faa6f72441ca5819acfbe4a50bfd9a5a6444e8fae29f54c611e3f8f61cff824cdda48ecf85980d1c21546965c3d907f83

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        6291990746447637f646da0a7102aa29

                                                                                        SHA1

                                                                                        79afd968076fdc54e701ab6c097f23e1fe8a153a

                                                                                        SHA256

                                                                                        703df4903f46538e540c1ced1c4d3247552f175e563626ba3e6898efa1d5dc03

                                                                                        SHA512

                                                                                        50b1230abf3429e247dd6a8e878a7054e9cef2fc40e5df1c8e6b1c8cb7022cc19d5e0dd8569d5b379000f3c1681f8cf69f31fe1e21cd73fd336c8365ad55edcc

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        acdde3648d799ead46ddd5609a733b8d

                                                                                        SHA1

                                                                                        76745414d961a336d2ae9ea6c8427c2c08cd3e62

                                                                                        SHA256

                                                                                        b0926d0594d3cf11dc091b567f2e8702956817ccd2e713d3cd2f89bb89c9f50e

                                                                                        SHA512

                                                                                        6666dffd160f14231b97dbb988592ac6d22d2aeff3dd30dee2acd6e813bb83510a543558ef3d9847c5c86c3129161a759ca52cc722e36f77a2b7a89459031455

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\f3df91c436730d7a37c58d5f25d9bf4a56fa3a34.tbres

                                                                                        Filesize

                                                                                        4KB

                                                                                        MD5

                                                                                        5f4e4fea33cbc0f21c584c819f2e91ea

                                                                                        SHA1

                                                                                        d4d10cddcc207153f3e0d5b57a706823492190d3

                                                                                        SHA256

                                                                                        46b4c1e602594f4033018c79ebe8ead1369f7de5fcdc14b5919b2e73f10b4783

                                                                                        SHA512

                                                                                        d6d8bbc7acf39a809450c2f02c0e8d8f3942b684d2eb819cdeb12a6ceb92e38beed4b07bc69648cef68414576864dc97a241d729f735c0ee4e57946c52f46938

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                                                                        Filesize

                                                                                        9KB

                                                                                        MD5

                                                                                        7050d5ae8acfbe560fa11073fef8185d

                                                                                        SHA1

                                                                                        5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                                                        SHA256

                                                                                        cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                                                        SHA512

                                                                                        a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                                                      • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        d99808b2174b053ac2a9ac30e6edd1a4

                                                                                        SHA1

                                                                                        4f5775cc327130cee2d4246ce973b932c28e1fa3

                                                                                        SHA256

                                                                                        405c7fabb0478aca690ebe7713388c8b864f8156b3034c49554d55572b6e4096

                                                                                        SHA512

                                                                                        af0d1b41fa13b92ff283b992371ad733531325fbbcfa31ef439258505f20c7e2b93c5a53111bcf3e349022c08d236696d52c8ae769ff89932106e64e3c6be13e

                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                                        Filesize

                                                                                        3KB

                                                                                        MD5

                                                                                        3c39bcc668b6bf1c1b8b36e6aa5859cf

                                                                                        SHA1

                                                                                        a1170db978ed32ee9fffd8695873257a13bc1f5c

                                                                                        SHA256

                                                                                        0a51ba843f795248e6e51ab25b0de3ae85ba55d191da3607ecce4b44550b357e

                                                                                        SHA512

                                                                                        d29de824d003dc9ede1aba5fa95e29827a001335b4f8b18ef9ddd7891c54b0e204eb037b0d599bff2b48a99748b02eba49e8df3ebf853deea747ac1a8aae0866

                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                                        Filesize

                                                                                        3KB

                                                                                        MD5

                                                                                        53c87adbfd3d6b343058c16ec9a01034

                                                                                        SHA1

                                                                                        f72260732b4e1f89623f3c675a0d51008bd48f30

                                                                                        SHA256

                                                                                        cacc2d1bacf7dbfa59a9811195113755891d4b64f65d25502b950af33455d933

                                                                                        SHA512

                                                                                        ab5fd17112556237632f81db51b66418613e1d827a6a96359a6b02ee7b86921af97d4d865f0ee1894a03aa7f49fe9f888e1de068eb218923345d91bb4b78d166

                                                                                      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

                                                                                        Filesize

                                                                                        3.1MB

                                                                                        MD5

                                                                                        f5b93af3ee1b64dacd2bac9ba4af9b27

                                                                                        SHA1

                                                                                        1f2a038199a71a2b917dca4dff2f5fac5e840978

                                                                                        SHA256

                                                                                        48d4fde21b28f0614fdf124f83f5594bddc13292f21b775da58b017385a49b01

                                                                                        SHA512

                                                                                        83703b0f567723abe3d6b34bd419be5df3475e049ae8893993fec017da9a420cd875184c570bdffbfc0bccac662762991885dea8ebcc2af172b3aac2fb00a302

                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        820f9d86754330e2a781780e4824f2e5

                                                                                        SHA1

                                                                                        0c98d60d6d1f2678ef84bcb2d16bd086194cdfc5

                                                                                        SHA256

                                                                                        e5806bf213771c0739b457b681782217123b3aeeb3aa4643f9ca955a65d12e24

                                                                                        SHA512

                                                                                        a127790a1267eaa59dd537abdce6ea59e2b3545d9a14d46395b5d3bd678a2c38c5b01331384b142ddfcfe52b70114a8064ec6875fba9019b354a9fa5f94956eb

                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                        Filesize

                                                                                        3KB

                                                                                        MD5

                                                                                        0aaf4d88c6447a07335a4d0a2ee33b77

                                                                                        SHA1

                                                                                        323c1d5f69332a4fa04f95c363f3bd5f9aca06a3

                                                                                        SHA256

                                                                                        0442b588d6b4117eb5144c15d297a263bcce8bc8ac29d41f0d0cb4e1ec13d80f

                                                                                        SHA512

                                                                                        0e167e1bcb9054e65c95bfb6573fc11207bb8866117ccbabf20070200c8740a281d152f98a1f70c6fa7a57ba491982a745518f3956b85e2186bdd911ca7fa125

                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                        Filesize

                                                                                        4KB

                                                                                        MD5

                                                                                        6f71994018a48263fef3848945fcfef2

                                                                                        SHA1

                                                                                        65b1f9e198082a29e1881548729e78a6abfa185d

                                                                                        SHA256

                                                                                        fae72f6e384f1c0e48bcdedb11f67ceed3cbeee38e180d6ca86b099975038b4f

                                                                                        SHA512

                                                                                        75e58ceb352e7e0e2b9708fc658d584d97c1ca3b02f3357b7dd4ad3598d6929989584e14079230c7412061ffd8ce429aac73a6863e41e8941e43157d0bc87590

                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                        Filesize

                                                                                        6KB

                                                                                        MD5

                                                                                        c15e6701914a31ebbec4f4aeb564a917

                                                                                        SHA1

                                                                                        7509f77bcdad71f794398067c1074e3a2bc07173

                                                                                        SHA256

                                                                                        a41d8e6ff817de787b494c8a6ac5312b0ebdc9022ba8433251c67e75020de7c9

                                                                                        SHA512

                                                                                        6687c45a618cd7aeda1ddd7b6048f1b094647697b15e510c933ff2a420d33ec1771f96647a4e5406cd1e3d1aff7e18d6e670f1cd112d75d03db0cf3f4140080f

                                                                                      • \??\pipe\LOCAL\crashpad_5176_YPCJABNLCSAMSNUX

                                                                                        MD5

                                                                                        d41d8cd98f00b204e9800998ecf8427e

                                                                                        SHA1

                                                                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                        SHA256

                                                                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                        SHA512

                                                                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                      • memory/644-486-0x00007FFA9F320000-0x00007FFA9F361000-memory.dmp

                                                                                        Filesize

                                                                                        260KB

                                                                                      • memory/644-452-0x00007FF7C6100000-0x00007FF7C61F8000-memory.dmp

                                                                                        Filesize

                                                                                        992KB

                                                                                      • memory/644-453-0x00007FFAA0830000-0x00007FFAA0864000-memory.dmp

                                                                                        Filesize

                                                                                        208KB

                                                                                      • memory/644-478-0x00007FFAAE630000-0x00007FFAAE648000-memory.dmp

                                                                                        Filesize

                                                                                        96KB

                                                                                      • memory/644-479-0x00007FFAAE070000-0x00007FFAAE087000-memory.dmp

                                                                                        Filesize

                                                                                        92KB

                                                                                      • memory/644-454-0x00007FFA8F050000-0x00007FFA8F306000-memory.dmp

                                                                                        Filesize

                                                                                        2.7MB

                                                                                      • memory/644-480-0x00007FFAA37D0000-0x00007FFAA37E1000-memory.dmp

                                                                                        Filesize

                                                                                        68KB

                                                                                      • memory/644-481-0x00007FFAA0610000-0x00007FFAA0627000-memory.dmp

                                                                                        Filesize

                                                                                        92KB

                                                                                      • memory/644-482-0x00007FFAA05F0000-0x00007FFAA0601000-memory.dmp

                                                                                        Filesize

                                                                                        68KB

                                                                                      • memory/644-483-0x00007FFA9FE40000-0x00007FFA9FE5D000-memory.dmp

                                                                                        Filesize

                                                                                        116KB

                                                                                      • memory/644-484-0x00007FFA9FB30000-0x00007FFA9FB41000-memory.dmp

                                                                                        Filesize

                                                                                        68KB

                                                                                      • memory/644-487-0x00007FFA9FA60000-0x00007FFA9FA81000-memory.dmp

                                                                                        Filesize

                                                                                        132KB

                                                                                      • memory/644-488-0x00007FFA9F300000-0x00007FFA9F318000-memory.dmp

                                                                                        Filesize

                                                                                        96KB

                                                                                      • memory/644-489-0x00007FFA9F2E0000-0x00007FFA9F2F1000-memory.dmp

                                                                                        Filesize

                                                                                        68KB

                                                                                      • memory/644-490-0x00007FFA9F2C0000-0x00007FFA9F2D1000-memory.dmp

                                                                                        Filesize

                                                                                        68KB

                                                                                      • memory/644-491-0x00007FFA9F240000-0x00007FFA9F251000-memory.dmp

                                                                                        Filesize

                                                                                        68KB

                                                                                      • memory/644-492-0x00007FFA9F220000-0x00007FFA9F23B000-memory.dmp

                                                                                        Filesize

                                                                                        108KB

                                                                                      • memory/644-485-0x00007FFA8EE40000-0x00007FFA8F04B000-memory.dmp

                                                                                        Filesize

                                                                                        2.0MB

                                                                                      • memory/884-17-0x00007FFA86850000-0x00007FFA86860000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/884-16-0x00007FFA86850000-0x00007FFA86860000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/884-19-0x00007FFA86850000-0x00007FFA86860000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/884-20-0x00007FFA86850000-0x00007FFA86860000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/884-18-0x00007FFA86850000-0x00007FFA86860000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/884-22-0x00007FFA84190000-0x00007FFA841A0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/884-21-0x00007FFA84190000-0x00007FFA841A0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/1120-0-0x00007FFAA8273000-0x00007FFAA8275000-memory.dmp

                                                                                        Filesize

                                                                                        8KB

                                                                                      • memory/1120-1-0x00000000005B0000-0x00000000008D4000-memory.dmp

                                                                                        Filesize

                                                                                        3.1MB

                                                                                      • memory/1120-5-0x00007FFAA8270000-0x00007FFAA8D32000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/1120-2-0x00007FFAA8270000-0x00007FFAA8D32000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/2636-83-0x000000000A1E0000-0x000000000A1F0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/2636-80-0x000000000A1E0000-0x000000000A1F0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/2636-81-0x000000000A1E0000-0x000000000A1F0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/2636-84-0x000000000A1E0000-0x000000000A1F0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/2636-87-0x000000000A1E0000-0x000000000A1F0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/2636-82-0x000000000A1E0000-0x000000000A1F0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/2636-86-0x000000000A1E0000-0x000000000A1F0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/2636-85-0x000000000A1E0000-0x000000000A1F0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-92-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-102-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-105-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-106-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-103-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-98-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-94-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-97-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-95-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-96-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-93-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-99-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-107-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-15-0x00007FFAA8270000-0x00007FFAA8D32000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/4756-14-0x00007FFAA8270000-0x00007FFAA8D32000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/4756-13-0x000000001D300000-0x000000001D33C000-memory.dmp

                                                                                        Filesize

                                                                                        240KB

                                                                                      • memory/4756-12-0x000000001D2A0000-0x000000001D2B2000-memory.dmp

                                                                                        Filesize

                                                                                        72KB

                                                                                      • memory/4756-9-0x000000001D360000-0x000000001D412000-memory.dmp

                                                                                        Filesize

                                                                                        712KB

                                                                                      • memory/4756-8-0x000000001D250000-0x000000001D2A0000-memory.dmp

                                                                                        Filesize

                                                                                        320KB

                                                                                      • memory/4756-7-0x00007FFAA8270000-0x00007FFAA8D32000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/4756-101-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-6-0x00007FFAA8270000-0x00007FFAA8D32000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/4756-100-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB

                                                                                      • memory/4756-104-0x000000001D2C0000-0x000000001D2D0000-memory.dmp

                                                                                        Filesize

                                                                                        64KB