Analysis

  • max time kernel
    230s
  • max time network
    267s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-11-2024 21:09

Errors

Reason
Machine shutdown

General

  • Target

    https://cdn.discordapp.com/attachments/1304480397991870554/1305166099561582672/totallynotscam.exe?ex=67320a26&is=6730b8a6&hm=9d210441a97c80fff970d9572657718b77795437fe356ea7472402b0eb9f9d1a&

Malware Config

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

nickman12-46565.portmap.io:46565

nickman12-46565.portmap.io:1735

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    Userdata.exe

  • copy_folder

    Userdata

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %WinDir%\System32

  • mouse_option

    false

  • mutex

    remcos_vcexssuhap

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

warzonerat

C2

168.61.222.215:5400

Signatures

  • CryptoLocker

    Ransomware family with multiple variants.

  • Cryptolocker family
  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Dharma family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • UAC bypass 3 TTPs 4 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Renames multiple (178) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Warzone RAT payload 2 IoCs
  • Contacts a large (1127) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops desktop.ini file(s) 16 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Interacts with shadow copies 3 TTPs 6 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1304480397991870554/1305166099561582672/totallynotscam.exe?ex=67320a26&is=6730b8a6&hm=9d210441a97c80fff970d9572657718b77795437fe356ea7472402b0eb9f9d1a&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8658546f8,0x7ff865854708,0x7ff865854718
      2⤵
        PID:4024
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
        2⤵
          PID:2480
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4936
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:8
          2⤵
            PID:3232
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
            2⤵
              PID:2160
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
              2⤵
                PID:2408
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5444 /prefetch:8
                2⤵
                  PID:3968
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                  2⤵
                    PID:3432
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6000 /prefetch:8
                    2⤵
                      PID:5096
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:8
                      2⤵
                        PID:2800
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1332
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1
                        2⤵
                          PID:3616
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:1
                          2⤵
                            PID:4740
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                            2⤵
                              PID:1460
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2348 /prefetch:1
                              2⤵
                                PID:1920
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6572 /prefetch:1
                                2⤵
                                  PID:2968
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                                  2⤵
                                    PID:4020
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:1
                                    2⤵
                                      PID:2432
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6632 /prefetch:1
                                      2⤵
                                        PID:524
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:1
                                        2⤵
                                          PID:2288
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1792 /prefetch:1
                                          2⤵
                                            PID:3476
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6840 /prefetch:1
                                            2⤵
                                              PID:1732
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:1
                                              2⤵
                                                PID:3176
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                                                2⤵
                                                  PID:1292
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:1
                                                  2⤵
                                                    PID:4592
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1180 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4292
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                                                    2⤵
                                                      PID:756
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4992 /prefetch:2
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2852
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:1
                                                      2⤵
                                                        PID:4664
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                                                        2⤵
                                                          PID:4456
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6800 /prefetch:1
                                                          2⤵
                                                            PID:1952
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7072 /prefetch:1
                                                            2⤵
                                                              PID:2988
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16385232466232985905,12649810812230674081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1
                                                              2⤵
                                                                PID:4060
                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                              1⤵
                                                                PID:3076
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:1952
                                                                • C:\Windows\system32\cmd.exe
                                                                  "C:\Windows\system32\cmd.exe"
                                                                  1⤵
                                                                    PID:4940
                                                                  • C:\Windows\System32\rundll32.exe
                                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                    1⤵
                                                                      PID:3560
                                                                    • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\WinNuke.98.exe
                                                                      "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\WinNuke.98.exe"
                                                                      1⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3552
                                                                    • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\WinNuke.98.exe
                                                                      "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\WinNuke.98.exe"
                                                                      1⤵
                                                                        PID:3180
                                                                      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                                        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Melissa.doc" /o ""
                                                                        1⤵
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1364
                                                                      • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Worm\Nople.exe
                                                                        "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Worm\Nople.exe"
                                                                        1⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4956
                                                                      • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\Remcos.exe
                                                                        "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\Remcos.exe"
                                                                        1⤵
                                                                        • Adds Run key to start application
                                                                        • Drops file in System32 directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:552
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                          2⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2448
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                            3⤵
                                                                            • UAC bypass
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies registry key
                                                                            PID:460
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
                                                                          2⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:4292
                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                            PING 127.0.0.1 -n 2
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:4628
                                                                          • C:\Windows\SysWOW64\Userdata\Userdata.exe
                                                                            "C:\Windows\SysWOW64\Userdata\Userdata.exe"
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • Adds Run key to start application
                                                                            • Suspicious use of SetThreadContext
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:408
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3708
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                5⤵
                                                                                • UAC bypass
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Modifies registry key
                                                                                PID:4420
                                                                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                                                                              4⤵
                                                                              • Drops file in System32 directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:4528
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                5⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:4520
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                  6⤵
                                                                                  • UAC bypass
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Modifies registry key
                                                                                  PID:4904
                                                                      • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\WarzoneRAT.exe
                                                                        "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\RAT\WarzoneRAT.exe"
                                                                        1⤵
                                                                        • Suspicious use of SetThreadContext
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2592
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB528.tmp"
                                                                          2⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:4672
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                          2⤵
                                                                            PID:1712
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                            2⤵
                                                                              PID:316
                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                              2⤵
                                                                                PID:3216
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                2⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:4992
                                                                            • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\Annabelle.exe
                                                                              "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\Annabelle.exe"
                                                                              1⤵
                                                                              • Modifies WinLogon for persistence
                                                                              • Modifies Windows Defender Real-time Protection settings
                                                                              • UAC bypass
                                                                              • Disables RegEdit via registry modification
                                                                              • Event Triggered Execution: Image File Execution Options Injection
                                                                              • Impair Defenses: Safe Mode Boot
                                                                              • Adds Run key to start application
                                                                              PID:2788
                                                                              • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                vssadmin delete shadows /all /quiet
                                                                                2⤵
                                                                                • Interacts with shadow copies
                                                                                PID:3904
                                                                              • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                vssadmin delete shadows /all /quiet
                                                                                2⤵
                                                                                • Interacts with shadow copies
                                                                                PID:2328
                                                                              • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                vssadmin delete shadows /all /quiet
                                                                                2⤵
                                                                                • Interacts with shadow copies
                                                                                PID:4016
                                                                              • C:\Windows\SYSTEM32\NetSh.exe
                                                                                NetSh Advfirewall set allprofiles state off
                                                                                2⤵
                                                                                • Modifies Windows Firewall
                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                PID:3228
                                                                              • C:\Windows\System32\shutdown.exe
                                                                                "C:\Windows\System32\shutdown.exe" -r -t 00 -f
                                                                                2⤵
                                                                                  PID:50772
                                                                              • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\Cerber5.exe
                                                                                "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\Cerber5.exe"
                                                                                1⤵
                                                                                • Enumerates connected drives
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:3480
                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                  C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                                                                  2⤵
                                                                                  • Modifies Windows Firewall
                                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:408
                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                  C:\Windows\system32\netsh.exe advfirewall reset
                                                                                  2⤵
                                                                                  • Modifies Windows Firewall
                                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1016
                                                                              • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\CoronaVirus.exe
                                                                                "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\CoronaVirus.exe"
                                                                                1⤵
                                                                                • Drops startup file
                                                                                • Adds Run key to start application
                                                                                • Drops desktop.ini file(s)
                                                                                • Drops file in System32 directory
                                                                                • Drops file in Program Files directory
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:4884
                                                                                • C:\Windows\System32\mshta.exe
                                                                                  "C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                                                                  2⤵
                                                                                    PID:51560
                                                                                  • C:\Windows\System32\mshta.exe
                                                                                    "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                                                                    2⤵
                                                                                      PID:51532
                                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\CryptoLocker.exe
                                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\CryptoLocker.exe"
                                                                                    1⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2404
                                                                                    • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\CryptoLocker.exe"
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      • Adds Run key to start application
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4540
                                                                                      • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w00000220
                                                                                        3⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:3180
                                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\DeriaLock.exe
                                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\DeriaLock.exe"
                                                                                    1⤵
                                                                                    • Drops startup file
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:524
                                                                                  • C:\Windows\system32\vssvc.exe
                                                                                    C:\Windows\system32\vssvc.exe
                                                                                    1⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5088
                                                                                  • C:\Windows\system32\werfault.exe
                                                                                    werfault.exe /h /shared Global\116762e125604fc8817935518585380e /t 2320 /p 3536
                                                                                    1⤵
                                                                                      PID:13780
                                                                                    • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\Annabelle.exe
                                                                                      C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\Annabelle.exe
                                                                                      1⤵
                                                                                        PID:51504
                                                                                        • C:\Windows\system32\vssadmin.exe
                                                                                          vssadmin delete shadows /all /quiet
                                                                                          2⤵
                                                                                          • Interacts with shadow copies
                                                                                          PID:51208
                                                                                        • C:\Windows\system32\vssadmin.exe
                                                                                          vssadmin delete shadows /all /quiet
                                                                                          2⤵
                                                                                          • Interacts with shadow copies
                                                                                          PID:51196
                                                                                        • C:\Windows\system32\vssadmin.exe
                                                                                          vssadmin delete shadows /all /quiet
                                                                                          2⤵
                                                                                          • Interacts with shadow copies
                                                                                          PID:51188
                                                                                        • C:\Windows\system32\NetSh.exe
                                                                                          NetSh Advfirewall set allprofiles state off
                                                                                          2⤵
                                                                                          • Modifies Windows Firewall
                                                                                          PID:51180
                                                                                      • C:\Windows\system32\LogonUI.exe
                                                                                        "LogonUI.exe" /flags:0x4 /state0:0xa3861055 /state1:0x41c64e6d
                                                                                        1⤵
                                                                                          PID:50700

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-2F5C63C0.[[email protected]].ncov

                                                                                          Filesize

                                                                                          2.7MB

                                                                                          MD5

                                                                                          db78905113ccbd5a2515f4e18995a528

                                                                                          SHA1

                                                                                          1efa33da95f249c7eff3c3fd1c7656e690ea7bb4

                                                                                          SHA256

                                                                                          8d71d1ef8f372b5ae2688c4a84a69f31862d4af136846dadafe09f83d342bb54

                                                                                          SHA512

                                                                                          80c943ff5efc96d3c5b8ad6c04442441f5934121b34a1d90bff5b415e3b8edca5c77eea303f3659f8758f126c0daa7c2e97339bf0467ec9f208866252b0fb48d

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          d7cb450b1315c63b1d5d89d98ba22da5

                                                                                          SHA1

                                                                                          694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                                                          SHA256

                                                                                          38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                                                          SHA512

                                                                                          df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          37f660dd4b6ddf23bc37f5c823d1c33a

                                                                                          SHA1

                                                                                          1c35538aa307a3e09d15519df6ace99674ae428b

                                                                                          SHA256

                                                                                          4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                                                          SHA512

                                                                                          807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                                          Filesize

                                                                                          62KB

                                                                                          MD5

                                                                                          c3c0eb5e044497577bec91b5970f6d30

                                                                                          SHA1

                                                                                          d833f81cf21f68d43ba64a6c28892945adc317a6

                                                                                          SHA256

                                                                                          eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb

                                                                                          SHA512

                                                                                          83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                          Filesize

                                                                                          67KB

                                                                                          MD5

                                                                                          fb2f02c107cee2b4f2286d528d23b94e

                                                                                          SHA1

                                                                                          d76d6b684b7cfbe340e61734a7c197cc672b1af3

                                                                                          SHA256

                                                                                          925dd883d5a2eb44cf1f75e8d71346b98f14c4412a0ea0c350672384a0e83e7a

                                                                                          SHA512

                                                                                          be51d371b79f4cc1f860706207d5978d18660bf1dc0ca6706d43ca0375843ec924aa4a8ed44867661a77e3ec85e278c559ab6f6946cba4f43daf3854b838bb82

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                                          Filesize

                                                                                          63KB

                                                                                          MD5

                                                                                          710d7637cc7e21b62fd3efe6aba1fd27

                                                                                          SHA1

                                                                                          8645d6b137064c7b38e10c736724e17787db6cf3

                                                                                          SHA256

                                                                                          c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b

                                                                                          SHA512

                                                                                          19aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                                          Filesize

                                                                                          19KB

                                                                                          MD5

                                                                                          2e86a72f4e82614cd4842950d2e0a716

                                                                                          SHA1

                                                                                          d7b4ee0c9af735d098bff474632fc2c0113e0b9c

                                                                                          SHA256

                                                                                          c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f

                                                                                          SHA512

                                                                                          7a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                          Filesize

                                                                                          4KB

                                                                                          MD5

                                                                                          8cbcdb6f612df1d6232460b4af967e3a

                                                                                          SHA1

                                                                                          2d663bbb3b518fd55ae767f042fc2cb02f6205a1

                                                                                          SHA256

                                                                                          d87b0c19e2e5de3870757040f9c5715a3b1904b5c2edba03b0f92a059fa1e11b

                                                                                          SHA512

                                                                                          c3d021d9bc460c1e475b8ac1e88318e1c0bd71d5b75cea15b3102b75f449902cdd79a29072ac7166fd229fc942c229ead8d09f64baf640414fac0809566fc92a

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                          Filesize

                                                                                          3KB

                                                                                          MD5

                                                                                          61376e9f574ac0a86708986ed2d873ec

                                                                                          SHA1

                                                                                          cde881ca1b7ed97e516a67bf6431bf5c64094320

                                                                                          SHA256

                                                                                          9e17e95cc3d7201bd9945f10379e11d5d2ad71c2c0d9db2f93d49f406e04a2d5

                                                                                          SHA512

                                                                                          5c6fb1ca9227a4a71fac4627d78ae637b70e9d7aed8ac7826eb38c3dc0bd1ae42b16c1f8c89988aef25113f52a41f2c752098524537f152e1d1d1b17cf067297

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          e0c648befc714d8d396f47195743f349

                                                                                          SHA1

                                                                                          eb134e2289ffe157847ec55b8fe884e474a13539

                                                                                          SHA256

                                                                                          e5ec14c978d9f5007e45c97fc838d4faf6073491161bdd2e8ddf03f16a6399db

                                                                                          SHA512

                                                                                          9549125ac66e01b6e56f78f7072bfbface8c7eeb36a56c570b3bdcc9fcb9aebd1e2eab65792242088c69dc30e168c995a4a18157ae9eb93f773d138048425059

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                          Filesize

                                                                                          856B

                                                                                          MD5

                                                                                          887b084c3205e3088fd973f43cc26d2e

                                                                                          SHA1

                                                                                          6e29e2d28f70297e2fd76299e2cc189d1322138b

                                                                                          SHA256

                                                                                          c4c7492061057f3f855527f09e047e20850c64b5043d17d89c145a1ad96d57f0

                                                                                          SHA512

                                                                                          e97b16dd80bc0df05b6d424051c6acf94ef60d5fbd0c38adc41921e5eb75bbcd7986f57d7720c84d4124542da9cb4e50dad55e145eafbaa524b94e8486f89fd8

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                          Filesize

                                                                                          111B

                                                                                          MD5

                                                                                          285252a2f6327d41eab203dc2f402c67

                                                                                          SHA1

                                                                                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                          SHA256

                                                                                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                          SHA512

                                                                                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          6f6190ae36e2e9467d7f837ec7a9bc9d

                                                                                          SHA1

                                                                                          278ee57e252d6365d5068384b3070f386095d014

                                                                                          SHA256

                                                                                          5911bd79b9bb678434c2fb414d3c422e5adf5371cf5351e4551c909d417bf7ef

                                                                                          SHA512

                                                                                          035400750900401cd8df4dc97c0dedc0526e6baf25378965d19f69ec9148faaaf987d79940ca888d8a7c7708c7571b642649b77f47a0452a0d93f662e8c19415

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          7KB

                                                                                          MD5

                                                                                          97132854a0dd811e1eb7be762eabf97c

                                                                                          SHA1

                                                                                          49f655e0e5378fb03d8451982cbbb2edc4dc8fca

                                                                                          SHA256

                                                                                          d1b33e53998ce11a9c7c9a6028a71464f9170ee852588e01fd8fe377649ee91f

                                                                                          SHA512

                                                                                          bf4a0acea3251c4f0e5083b6f1b375de03afb73edd3c5ed68d782c687237fccc71f7c6ca70851364a8f19418468508a4bb4539f1e2cc375c955bc23f1a98e50f

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          7KB

                                                                                          MD5

                                                                                          b3acfe0e4d67b2372bbd5663782605ca

                                                                                          SHA1

                                                                                          bddecb6cddbe40934cb4c1f66b283b2cefb74ea3

                                                                                          SHA256

                                                                                          9f7b91db66b875b5010aa10d586843c32a3fa9ffb0e3dbce6379bb7cfe681afc

                                                                                          SHA512

                                                                                          c2fe9ea02acb2c2e851d0b53c3b29ef49b36b39f7a761737d209d1eb028e0e205c6595ffd86f727399539fe33dc4ca0cec1bf9be2602833280ecf45545ce7ce3

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          5KB

                                                                                          MD5

                                                                                          495f9141d6cc07cb6483ea5640fbd433

                                                                                          SHA1

                                                                                          bafac2efc37cffbacebed62d4c17f75302ed12e0

                                                                                          SHA256

                                                                                          6f4a1ec52e25c4a65b4619e29fe43637bd181288da2512b99ccd94f0d2466b4c

                                                                                          SHA512

                                                                                          9083b5db00bdf919508870d3188838025b81bfe893b2292d2897e931d6fc2a5501bbdd3b654056d54a6fd9fa05be72e61e759317cf6cd16a3dbca2676230bdc1

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          6KB

                                                                                          MD5

                                                                                          d3041389761fbc7339ff532f0f8a2c24

                                                                                          SHA1

                                                                                          d2a6f7127ea7a596895ebf5a2eacb23d19e5cc53

                                                                                          SHA256

                                                                                          17e775daba42986ae1aa7f9d0db4b1fcf0590a836eda7bc6ec34aaffb4ab09e7

                                                                                          SHA512

                                                                                          fb5e684cf3429b845305e6e018665d85ac34131a1d0fc722e14838c7b378ad9142af9ab4f3325900d5e3f7c5372d0f84d7be2e93b672b0f6ac3d25ce42e96797

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          6KB

                                                                                          MD5

                                                                                          ac1371d2fc290112899abdc5b81f741b

                                                                                          SHA1

                                                                                          4bb39d742320b1f3a486512a6c1d2e7e1a45c59f

                                                                                          SHA256

                                                                                          84125ceb9c0839c926c6f4025a261bacf9ca2d9b8f385c89390ca0465fb3bf47

                                                                                          SHA512

                                                                                          b3d832b1b7467ceb66eb7de2c0700211d12497c96343110c69025b4041afb819f826954f214e96bd4254a1617b9172342a831e51351cd648ad539b825821895f

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          7KB

                                                                                          MD5

                                                                                          a8ac5584a34e8ebfd6434b010c4ab11e

                                                                                          SHA1

                                                                                          ea0f1f1e4065f2acd956f83427717403b4284959

                                                                                          SHA256

                                                                                          e8db66a48f91fc778c13e4d9312e6db39625509570edca4c2a350a240bafdd74

                                                                                          SHA512

                                                                                          2d9944f9e02fc545fba9c5fc6b59b4640bc2a5259c146006474dcd3a201c5571c9d456523da6ee3bf399ffbb21c9dadf3cbdab4978ef15a9cab870de80094577

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          6KB

                                                                                          MD5

                                                                                          adef62be6a1f9055ab74de2ea00a3088

                                                                                          SHA1

                                                                                          3af9c771253f53624f337639845f5ec383bf934b

                                                                                          SHA256

                                                                                          96fce6f9c55db6d274d248384fc261ceaf9820125f1d05bbdff8598dbc772ddb

                                                                                          SHA512

                                                                                          02f6ccf8ab97b755730d65e47675869ee1d0e6bb39ce09a0b11d6be44d909622c45e370a7036221157dc2d1f8e216241506c695abb31835d43adce3ab7d842dc

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          4ec18f31bae39696e4df68c81ad98922

                                                                                          SHA1

                                                                                          5c9f90dbb2c19395c53c6c245d028ebb23e8ee0f

                                                                                          SHA256

                                                                                          015c86670e00897769d72169480853e70f29205ebcbb418e51d351084b91a69c

                                                                                          SHA512

                                                                                          6b9c5ed9264b80ebe76e79deb144116d7f2a2dbed89bf5f27e62054c8f6cbec4c7f4578c2614ac4aba051ff006bda9169174f81e311dc757c7862adb6a7cfebe

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          c6fe379759ff8453cc2bad9d73f55d82

                                                                                          SHA1

                                                                                          c69bd8d515886595c2427bee735389da0d57075c

                                                                                          SHA256

                                                                                          ec72eb727871197b54eb6cd4e00ed14bb959889d8de0cf3c67a8db928973dd0c

                                                                                          SHA512

                                                                                          dc7bf34e80c706651eed5f735d0d56774906e81b3b84acef9b87c3dd682e4ff22c49c6e013773c9cea8f80e9a34abb9154bda41918590387f605360a516afa19

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          80cc131d60b19d6eb79770142222751c

                                                                                          SHA1

                                                                                          9109da91e513825529f4a3e66a2e3cb9c64253c6

                                                                                          SHA256

                                                                                          c9c7492177fab7c3da5abcfe9e2c8ff538df924e4f1cf5851091da0e1f79a6f1

                                                                                          SHA512

                                                                                          3551fcf5f0bf52f2f78d825febd1ac94fac2f1b51c42a288e0b30d8baecb566cb2ba038499702c83e0208d6f23b5a88c4e59ae506da16fadb66b29d3b4c4442d

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe584e5a.TMP

                                                                                          Filesize

                                                                                          705B

                                                                                          MD5

                                                                                          b342629a284628019bdb6526bf8099f1

                                                                                          SHA1

                                                                                          64cdeca47b1e28d875615d2be1fd5952f6faae23

                                                                                          SHA256

                                                                                          3d7d43f3003a0e45cb6339df658adbee6df3795f0f5c5289c9637ec52517abe1

                                                                                          SHA512

                                                                                          2053f88c47d19385876a320a3beb17f253e37eeda80b3a0dae0abd924393d59308995add3c9aede958b3c82a9c766e486663c478f9cf54de7cfcaca16eb920e4

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                          Filesize

                                                                                          16B

                                                                                          MD5

                                                                                          46295cac801e5d4857d09837238a6394

                                                                                          SHA1

                                                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                          SHA256

                                                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                          SHA512

                                                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                          Filesize

                                                                                          16B

                                                                                          MD5

                                                                                          206702161f94c5cd39fadd03f4014d98

                                                                                          SHA1

                                                                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                          SHA256

                                                                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                          SHA512

                                                                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db

                                                                                          Filesize

                                                                                          16KB

                                                                                          MD5

                                                                                          9e02552124890dc7e040ce55841d75a4

                                                                                          SHA1

                                                                                          f4179e9e3c00378fa4ad61c94527602c70aa0ad9

                                                                                          SHA256

                                                                                          7b6e4ce73ddd8b5e7a7c4a94374ac2815d0048a5296879d7659a92ee0b425c77

                                                                                          SHA512

                                                                                          3e10237b1bff73f3bb031f108b8de18f1b3c3396d63dfee8eb2401ce650392b9417143a9ef5234831d8386fc12e232b583dd45eada3f2828b3a0a818123dd5cd

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db

                                                                                          Filesize

                                                                                          76KB

                                                                                          MD5

                                                                                          2c72e8019c56945620c58eaf8b6f4847

                                                                                          SHA1

                                                                                          144f9a0e8de60787b3e412e705ac3cc77d0e31c7

                                                                                          SHA256

                                                                                          fa140fe951f98f952d607df70230064317b10646621d4342432b31d8e8a846cd

                                                                                          SHA512

                                                                                          f3b2219b3543478561713816ea7614628308d3a26a102855df941406a6eb97b2276bd39052dc4b5986d62bfc795252bc2eb03ab473c93b199eece034205425a1

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                          Filesize

                                                                                          11KB

                                                                                          MD5

                                                                                          946d2fa4ffa5ae90c42582413f2d4cd2

                                                                                          SHA1

                                                                                          60e31a7f581285b5d34596ec1d501efaabb83547

                                                                                          SHA256

                                                                                          0477693afe4321c06d9b0b0b5a1804924477ade236f714532332914f168923d1

                                                                                          SHA512

                                                                                          db1c49caedc98ee6f0fd6793621670ff7842822523389459d6bfb9d0e170942375ac64351407824906d56f604baa9d73e1cdc1571890639da21850e29973d0e6

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                          Filesize

                                                                                          10KB

                                                                                          MD5

                                                                                          077eededb7a3df3973ecc85431b8e018

                                                                                          SHA1

                                                                                          4464fe825ef4ab86aa67d25218f0befee7cc143d

                                                                                          SHA256

                                                                                          d7b2df891f143281b8844398abd28eae9026fc8ca6eb185b5eb93d073719e921

                                                                                          SHA512

                                                                                          7693394e3f905bcd622bf4ab0af358ea3caa3eb1cf3fb4659c3185550989ae3be2ba9374d9e74ab5e06b6c2ae0316da7c657fd7a4b350709cefdbe874f5dbdd2

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                          Filesize

                                                                                          11KB

                                                                                          MD5

                                                                                          ac34b69e6d626af2d21bbd334e6aba84

                                                                                          SHA1

                                                                                          6533a91456b2b02be919a45189084bcee410f0cc

                                                                                          SHA256

                                                                                          4709692223c574ba4f4a15ec3f5facd288f235727605e6305497fb047e1ced0a

                                                                                          SHA512

                                                                                          f073b8d68f4912ed97381586a755e7522c337b99731f51ffafee6c4861ddb0ace6bf09f972a0b104ce6193f9021017f9b673480d9c7226afb7a83d91d2c18676

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                                                                          Filesize

                                                                                          4KB

                                                                                          MD5

                                                                                          a3d6c953ce12281e35f0e52d48d25c39

                                                                                          SHA1

                                                                                          ca2920dedd8f72e27db324e32701fe716a739f02

                                                                                          SHA256

                                                                                          86f3b40fe677262ff92ef3e6edff6a51d01f5277d73cd52f47458bc27f1ce90e

                                                                                          SHA512

                                                                                          9471cf18fb74deceb654633c6e13a607414b7f4328e52f369991cea9340875638754270e43b383f455afbd2a436127f2adbb616e9377af2fa3a99a764f758739

                                                                                        • C:\Users\Admin\AppData\Local\Temp\TCD2525.tmp\iso690.xsl

                                                                                          Filesize

                                                                                          263KB

                                                                                          MD5

                                                                                          ff0e07eff1333cdf9fc2523d323dd654

                                                                                          SHA1

                                                                                          77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

                                                                                          SHA256

                                                                                          3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

                                                                                          SHA512

                                                                                          b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

                                                                                        • C:\Users\Admin\AppData\Local\Temp\install.bat

                                                                                          Filesize

                                                                                          187B

                                                                                          MD5

                                                                                          08d2e4a2d9e2c22025fc369cc551ca6c

                                                                                          SHA1

                                                                                          fbb518fd33cf1c752f762dc43d904cacad3aec00

                                                                                          SHA256

                                                                                          0e7dc72dce87f7448c7e65dfdae1ffebec653e4f066807a94993feb1039787bb

                                                                                          SHA512

                                                                                          92993473f027749718df243d6ac9480c1607cf908b3b01fc7dd92bd6afe4b8f3b0ae17c79fc75ed79c52cf79fc5f7bdc1814a4d132fd80202d80ba6539577686

                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpB528.tmp

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          3cca813999bd537c04d6f3216c0166db

                                                                                          SHA1

                                                                                          6f10b2a79c98a2352a7f30aeb7d1a7ab4be7b167

                                                                                          SHA256

                                                                                          d79aad3271d5b5677498bb4a31ab3c1d37f2d27351afd1e978ecaac96c89c567

                                                                                          SHA512

                                                                                          5a2a24fb8cf95b7cfe34f7cbe1b9be79b16ba51a3ab63c08c22f60374d3aee35a90373f90b626be334a16c0b19aa19eca2dadd7e18b71a5aad18ee913a016a6a

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                                                                          Filesize

                                                                                          410B

                                                                                          MD5

                                                                                          1fb211a987302ebb1ba63b3302414a5a

                                                                                          SHA1

                                                                                          bc4607442afc03577452fcfc9e568d4bf58ad178

                                                                                          SHA256

                                                                                          4839a91652b90dca91fabf2a98ccf595abf552d759cfe352f57cb80444844a79

                                                                                          SHA512

                                                                                          9872a40443f68c020ee7dc35a9c2b14720a6f78fffa80e7562895b4b9c34e7af1fc93851af66ea4a350c44cc511b4c570170be5d36e8246ea7a889cafbd6739a

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\~WRD0000.tmp

                                                                                          Filesize

                                                                                          26KB

                                                                                          MD5

                                                                                          49d91b1622728ee4b366620b105694c0

                                                                                          SHA1

                                                                                          1727fc27a12556d6a7f87064382148313173d2fd

                                                                                          SHA256

                                                                                          06591d55055cc6e7e5e98191b31072636bc804f3ba978d42048ffbfe6deff3ca

                                                                                          SHA512

                                                                                          e2f46f792133ed68ca401aef8cabfacdeb8dc1d77887474b955e787ced9e70ee7ecea893ac463d60655a0732a107f916d3ad05346f95685bd00592b21c38a1b3

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                          Filesize

                                                                                          4KB

                                                                                          MD5

                                                                                          7c4bc34146480411a6a598baa1d2f67b

                                                                                          SHA1

                                                                                          1c70883cf3a8b1377621d9df572038c7091281bf

                                                                                          SHA256

                                                                                          0d36e4cb3502506c3ea78ecc464c0de0358dc9b74f53bec97c2a2c0c3827b6ab

                                                                                          SHA512

                                                                                          55bfcf99ecbe7a49f79ce523cb898f85529aa5fb3d28438b4e70a8d5c3c2c2e697afcbd39d59bf50c87b0c8800e6111f97f6d15d58826afa7fd59d54bc0d0921

                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                          Filesize

                                                                                          3KB

                                                                                          MD5

                                                                                          901451089ec7e57284236e042db69b5d

                                                                                          SHA1

                                                                                          a51bd78d2979d0de14f52b88d5c979946864f175

                                                                                          SHA256

                                                                                          ee5e46e6ebe0d525ece52ae8ed90aab4cf49663dd0edb65a1c692f5176e91d08

                                                                                          SHA512

                                                                                          1ac4b920317df3066b91930f0566778726847a9f281a92003ed6ef25b9aaf34f5bbdb528b073c983ca7f3d952cb291e6c8c76231adc398efe1b1374e53c19687

                                                                                        • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe

                                                                                          Filesize

                                                                                          338KB

                                                                                          MD5

                                                                                          04fb36199787f2e3e2135611a38321eb

                                                                                          SHA1

                                                                                          65559245709fe98052eb284577f1fd61c01ad20d

                                                                                          SHA256

                                                                                          d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9

                                                                                          SHA512

                                                                                          533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444

                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 981000.crdownload

                                                                                          Filesize

                                                                                          4B

                                                                                          MD5

                                                                                          9b3af57091c0224d98a3de6b0a3443d8

                                                                                          SHA1

                                                                                          32c43a1038b82c0b8569ee147ebd37021b869853

                                                                                          SHA256

                                                                                          512da2dd46f2799b57f95ca472b746af98707bd65df21aa9c4f4f28e4f06e6c1

                                                                                          SHA512

                                                                                          40a9180183da1b8009301d2a80e48c14823da15a4fbbf7b0d0caafe34f97949ac6d8df7902e63707f5cf23b2d6cd8e5b96f57ac5923b57ea2d9f8a6f6f557419

                                                                                        • C:\Windows\SysWOW64\Userdata\Userdata.exe

                                                                                          Filesize

                                                                                          92KB

                                                                                          MD5

                                                                                          fb598b93c04baafe98683dc210e779c9

                                                                                          SHA1

                                                                                          c7ccd43a721a508b807c9bf6d774344df58e752f

                                                                                          SHA256

                                                                                          c851749fd6c9fa19293d8ee2c5b45b3dc8561115ddfe7166fbaefcb9b353b7c4

                                                                                          SHA512

                                                                                          1185ffe7e296eaaae50b7bd63baa6ffb8f5e76d4a897cb3800cead507a67c4e5075e677abdbf9831f3f81d01bdf1c06675a7c21985ef20a4bae5a256fd41cc0f

                                                                                        • C:\Windows\SysWOW64\remcos\logs.dat

                                                                                          Filesize

                                                                                          303B

                                                                                          MD5

                                                                                          ec994b1c2efb32b00117e19ea29d18ec

                                                                                          SHA1

                                                                                          b60a3b68a073ac97ad74539c075713a76f6502b7

                                                                                          SHA256

                                                                                          0a6d55d71ec661916214b32d227a92c03296928ea822fa746c221510ebc6050c

                                                                                          SHA512

                                                                                          be298d6f900a3a8635966b69a5817466437ada3b1c543bbc05cbc33f4432a297e49ad446aacabd3439709a285d4943fdb0c2c0532bc6d0663f40cf28d9fab9c0

                                                                                        • C:\Windows\SysWOW64\remcos\logs.dat

                                                                                          Filesize

                                                                                          503B

                                                                                          MD5

                                                                                          346ab0f0034abff0a58cbfe078fbe6ab

                                                                                          SHA1

                                                                                          500cf2d45b732f83df3e58c683d3c150972c710b

                                                                                          SHA256

                                                                                          ccd6f4e50cb6b85591bedcebb84bfbf1a5b189059360bf2d0166920260400d46

                                                                                          SHA512

                                                                                          6797df6c78999fa6b5ae4f1c266a4f90a4319236ee52f68d71df3a081f31ba6262ea8945d17dd7b44d4a5d35ce64657775c67fc073de36d249d76f05072963c8

                                                                                        • memory/524-1132-0x00000000055A0000-0x00000000055AA000-memory.dmp

                                                                                          Filesize

                                                                                          40KB

                                                                                        • memory/524-1133-0x0000000005940000-0x0000000005996000-memory.dmp

                                                                                          Filesize

                                                                                          344KB

                                                                                        • memory/524-1131-0x0000000000C70000-0x0000000000CF2000-memory.dmp

                                                                                          Filesize

                                                                                          520KB

                                                                                        • memory/1364-846-0x00007FF834450000-0x00007FF834460000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/1364-842-0x00007FF834450000-0x00007FF834460000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/1364-844-0x00007FF834450000-0x00007FF834460000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/1364-843-0x00007FF834450000-0x00007FF834460000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/1364-845-0x00007FF834450000-0x00007FF834460000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/1364-848-0x00007FF8323F0000-0x00007FF832400000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/1364-847-0x00007FF8323F0000-0x00007FF832400000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/2592-1102-0x00000000052F0000-0x0000000005894000-memory.dmp

                                                                                          Filesize

                                                                                          5.6MB

                                                                                        • memory/2592-1101-0x0000000000100000-0x0000000000156000-memory.dmp

                                                                                          Filesize

                                                                                          344KB

                                                                                        • memory/2592-1103-0x0000000004EF0000-0x0000000004F82000-memory.dmp

                                                                                          Filesize

                                                                                          584KB

                                                                                        • memory/2592-1106-0x0000000005280000-0x00000000052A8000-memory.dmp

                                                                                          Filesize

                                                                                          160KB

                                                                                        • memory/2592-1105-0x0000000005940000-0x00000000059DC000-memory.dmp

                                                                                          Filesize

                                                                                          624KB

                                                                                        • memory/2592-1104-0x0000000004ED0000-0x0000000004ED8000-memory.dmp

                                                                                          Filesize

                                                                                          32KB

                                                                                        • memory/2788-1130-0x0000026B9B230000-0x0000026B9C7BE000-memory.dmp

                                                                                          Filesize

                                                                                          21.6MB

                                                                                        • memory/2788-1117-0x0000026B80000000-0x0000026B80FF4000-memory.dmp

                                                                                          Filesize

                                                                                          16.0MB

                                                                                        • memory/3480-1129-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                          Filesize

                                                                                          204KB

                                                                                        • memory/3480-26816-0x0000000000440000-0x000000000044E000-memory.dmp

                                                                                          Filesize

                                                                                          56KB

                                                                                        • memory/3480-26801-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                          Filesize

                                                                                          204KB

                                                                                        • memory/4528-1100-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                          Filesize

                                                                                          92KB

                                                                                        • memory/4884-1120-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                          Filesize

                                                                                          1.4MB

                                                                                        • memory/4884-4946-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                          Filesize

                                                                                          1.4MB

                                                                                        • memory/4884-1166-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                          Filesize

                                                                                          1.4MB

                                                                                        • memory/4992-1114-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                                          Filesize

                                                                                          1.3MB

                                                                                        • memory/4992-1112-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                                          Filesize

                                                                                          1.3MB