Analysis

  • max time kernel
    1697s
  • max time network
    1707s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    11-12-2024 16:09

General

  • Target

    virus/FiddlerSetup.5.0.20245.10105-latest.exe

  • Size

    4.4MB

  • MD5

    c1980b018489df28be8809eb32519001

  • SHA1

    e860439703d7b6665af4507b20bbef2bbb7b73f4

  • SHA256

    588024037b1e5929b1f2a741fff52a207bcab17f0650ec7cb0cd3cb78051998d

  • SHA512

    f70d419e869e56700a9e23350a9779f5dd56bb78adb9a1b0d5039287a24f20004db20f842294d234d4717feaa3184a5e6d90f0ee3666208bad2ea518d37b0a35

  • SSDEEP

    98304:qMgxyUnSAaB1eXq8yOkLiGXv72Qomw6pvtFIAwdaRdA:qMoWvePjqHv72Qo96pvtF5wH

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 21 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 37 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\virus\FiddlerSetup.5.0.20245.10105-latest.exe
    "C:\Users\Admin\AppData\Local\Temp\virus\FiddlerSetup.5.0.20245.10105-latest.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\AppData\Local\Temp\nsp6C86.tmp\FiddlerSetup.exe
      "C:\Users\Admin\AppData\Local\Temp\nsp6C86.tmp\FiddlerSetup.exe" /D=
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="FiddlerProxy"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:64
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="FiddlerProxy" program="C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe" action=allow profile=any dir=in edge=deferuser protocol=tcp description="Permit inbound connections to Fiddler"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:5108
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" install "C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe"
        3⤵
          PID:928
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 0 -NGENProcess 1e4 -Pipe 1f0 -Comment "NGen Worker Process"
            4⤵
              PID:4164
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 28c -InterruptEvent 0 -NGENProcess 1ec -Pipe 1f4 -Comment "NGen Worker Process"
              4⤵
                PID:2564
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a0 -InterruptEvent 0 -NGENProcess 290 -Pipe 298 -Comment "NGen Worker Process"
                4⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:2496
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 0 -NGENProcess 2c8 -Pipe 28c -Comment "NGen Worker Process"
                4⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:3608
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 0 -NGENProcess 2c8 -Pipe 1ec -Comment "NGen Worker Process"
                4⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:2176
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a8 -InterruptEvent 0 -NGENProcess 2f0 -Pipe 1e4 -Comment "NGen Worker Process"
                4⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:4584
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 0 -NGENProcess 2c4 -Pipe 2d8 -Comment "NGen Worker Process"
                4⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:1664
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 0 -NGENProcess 2d4 -Pipe 2c4 -Comment "NGen Worker Process"
                4⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:2176
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2f8 -InterruptEvent 0 -NGENProcess 2d0 -Pipe 290 -Comment "NGen Worker Process"
                4⤵
                • Loads dropped DLL
                • Drops file in Windows directory
                PID:4176
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 310 -InterruptEvent 0 -NGENProcess 2d0 -Pipe 314 -Comment "NGen Worker Process"
                4⤵
                • Loads dropped DLL
                PID:5524
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 0 -NGENProcess 304 -Pipe 300 -Comment "NGen Worker Process"
                4⤵
                • Drops file in Windows directory
                PID:1820
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 31c -InterruptEvent 0 -NGENProcess 2fc -Pipe 318 -Comment "NGen Worker Process"
                4⤵
                • Drops file in Windows directory
                PID:5440
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 324 -InterruptEvent 0 -NGENProcess 31c -Pipe 2d0 -Comment "NGen Worker Process"
                4⤵
                • Drops file in Windows directory
                PID:4276
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 344 -InterruptEvent 0 -NGENProcess 334 -Pipe 33c -Comment "NGen Worker Process"
                4⤵
                • Drops file in Windows directory
                PID:5240
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 348 -InterruptEvent 0 -NGENProcess 35c -Pipe 34c -Comment "NGen Worker Process"
                4⤵
                • Drops file in Windows directory
                PID:2344
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 354 -InterruptEvent 0 -NGENProcess 330 -Pipe 358 -Comment "NGen Worker Process"
                4⤵
                • Drops file in Windows directory
                PID:5624
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" install "C:\Users\Admin\AppData\Local\Programs\Fiddler\EnableLoopback.exe"
              3⤵
                PID:3000
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 0 -NGENProcess 1e4 -Pipe 1f0 -Comment "NGen Worker Process"
                  4⤵
                    PID:5564
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 0 -NGENProcess 270 -Pipe 278 -Comment "NGen Worker Process"
                    4⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:5852
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 0 -NGENProcess 1f4 -Pipe 294 -Comment "NGen Worker Process"
                    4⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:5844
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 0 -NGENProcess 2f0 -Pipe 2dc -Comment "NGen Worker Process"
                    4⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:5980
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 0 -NGENProcess 300 -Pipe 2e8 -Comment "NGen Worker Process"
                    4⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:6120
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 300 -InterruptEvent 0 -NGENProcess 2a0 -Pipe 2e0 -Comment "NGen Worker Process"
                    4⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:2496
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2d8 -InterruptEvent 0 -NGENProcess 2d0 -Pipe 1e4 -Comment "NGen Worker Process"
                    4⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:5192
                • C:\Users\Admin\AppData\Local\Programs\Fiddler\SetupHelper
                  "C:\Users\Admin\AppData\Local\Programs\Fiddler\SetupHelper" /a "C:\Users\Admin\AppData\Local\Programs\Fiddler"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1200
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://fiddler2.com/r/?Fiddler2FirstRun
                  3⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:1448
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x140,0x144,0x148,0x11c,0x14c,0x7ff9973c46f8,0x7ff9973c4708,0x7ff9973c4718
                    4⤵
                      PID:2072
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                      4⤵
                        PID:1988
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1740
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:8
                        4⤵
                          PID:2008
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                          4⤵
                            PID:1616
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                            4⤵
                              PID:2656
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:1
                              4⤵
                                PID:2256
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                                4⤵
                                  PID:1104
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6020 /prefetch:8
                                  4⤵
                                    PID:4788
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5992 /prefetch:8
                                    4⤵
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3472
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6440 /prefetch:1
                                    4⤵
                                      PID:5224
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6472 /prefetch:1
                                      4⤵
                                        PID:5232
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:1
                                        4⤵
                                          PID:5660
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:1
                                          4⤵
                                            PID:5668
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6588 /prefetch:8
                                            4⤵
                                              PID:5612
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                              4⤵
                                              • Drops file in Program Files directory
                                              PID:5556
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x264,0x268,0x26c,0x240,0x270,0x7ff66c305460,0x7ff66c305470,0x7ff66c305480
                                                5⤵
                                                  PID:3116
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6588 /prefetch:8
                                                4⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5380
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11728884981701569566,630754682411816145,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:2
                                                4⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5452
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:3360
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:3440

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              39191fa5187428284a12dd49cca7e9b9

                                              SHA1

                                              36942ceec06927950e7d19d65dcc6fe31f0834f5

                                              SHA256

                                              60bae7be70eb567baf3aaa0f196b5c577e353a6cabef9c0a87711424a6089671

                                              SHA512

                                              a0d4e5580990ab6efe5f80410ad378c40b53191a2f36a5217f236b8aac49a4d2abf87f751159e3f789eaa00ad7e33bcc2efebc658cd1a4bcccfd187a7205bdbc

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              ef84d117d16b3d679146d02ac6e0136b

                                              SHA1

                                              3f6cc16ca6706b43779e84d24da752207030ccb4

                                              SHA256

                                              5d1f5e30dc4c664d08505498eda2cf0cf5eb93a234f0d9b24170b77ccad57000

                                              SHA512

                                              9f1a197dccbc2dcf64d28bebe07247df1a7a90e273474f80b4abd448c6427415bace98e829d40bccf2311de2723c3d1ad690a1cfdcf2e891b527344a9a2599d8

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              624B

                                              MD5

                                              77a3fffbfde12ac9ac88844dfc49dc25

                                              SHA1

                                              72f18d76ba77e38211a7d3909456b6b205ae86ee

                                              SHA256

                                              10e3a72758f727d37e6d8b1f195ea3bf49476cc699dfb1d878331c0e8f923d0b

                                              SHA512

                                              bd6c1f81af4ae78d82d4ebb5a3927f20ea215ae02d6e6b461c971481c6492a471f733e0881c552ad9e7465613b7c761c8ef37230a867a0b23d54620fc18f002d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              48B

                                              MD5

                                              d8651f016f4e06ed0c4d697863d5edb8

                                              SHA1

                                              d2412c248797ed8a920d0aa9b0298ce09b52ae80

                                              SHA256

                                              82e6fa6c769abd2bdf811047911a838c672e3c2fb1effd2521d24260b71e3f10

                                              SHA512

                                              413f5b74ca70ce92db9f9a68ba0c855cc31fb32167e4fffbe0c2b72da5a9ce0403c12dc1368213dc8b7ea95e57f00e53f1bd0103906dbd8de8c4af35ae771bdd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                              Filesize

                                              70KB

                                              MD5

                                              e5e3377341056643b0494b6842c0b544

                                              SHA1

                                              d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                              SHA256

                                              e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                              SHA512

                                              83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              2KB

                                              MD5

                                              1dbf8caa78a5c573f4d75a2c0ed1d545

                                              SHA1

                                              6a439ba148eb2ff7b2e201ba6ff7aa95d8cc8684

                                              SHA256

                                              c589baa80120c1b2a8e7c57914a390f534ecb07471a3f8c1c5d34605710861d2

                                              SHA512

                                              ee02e7f6fe8ace14f82604fe726e3d073747cb4b042408b8ca857ef69d6dd3010cdbe2bed3d8cb8c61078e37557db308d7493add3c99983e6ea8890f8c1ea647

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe58c7ef.TMP

                                              Filesize

                                              59B

                                              MD5

                                              2800881c775077e1c4b6e06bf4676de4

                                              SHA1

                                              2873631068c8b3b9495638c865915be822442c8b

                                              SHA256

                                              226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                              SHA512

                                              e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              f513ab5490f1280284aedfbff6651166

                                              SHA1

                                              f19c8617fb4b1f5ef953752fe2b78a594f6e6580

                                              SHA256

                                              c6b7cbc57543971025c9c1167ec132f97d1cdb67c020f92ca17545133d24f04b

                                              SHA512

                                              da3dc493dbfda44aa481a4f866d24394df071e086d3260502b13d605a25de15c9a639b433fedf7886a5f2d439c24a4d7b8b616dc8a8d1dbeeebd52cbbd762255

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              4KB

                                              MD5

                                              ece52ea9495c234009dcb288459652f0

                                              SHA1

                                              e4f7e47502b0e394c58892eb0c382fedae6d9760

                                              SHA256

                                              52550b2535b3cb585b97ff801953b5f310494731c0b5dfc472d653e1a2804a20

                                              SHA512

                                              8d3b8cb8df5f3a0b777baae7ebf756bf27e4de356c44d523cbda51ea151a6320303e41691c29bbdcac494b06c5d832e2953a9f225117b234fef4f8f1491846c5

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              a81dc55ed618559cd32cac7fb03861ea

                                              SHA1

                                              7cf6ad487258a2584762bbeb3987ccdb20c02d15

                                              SHA256

                                              6747fe6d81b96d34518557ce1bd75dca94b67679d11c0b5caf48c939111ad287

                                              SHA512

                                              42d26f3c76a312c6a2039465ae37e3d3a53ebbb8aaded640e3b9be70b40aea82c016210a47b98f6c0f618d3be34f44ce924b252946f5f3b0b7487a9fa841c94c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                              Filesize

                                              24KB

                                              MD5

                                              60d82bd601d64fd00bb0373f5ecd65b8

                                              SHA1

                                              0e8bde426270dfa3ea285c2c5b7282ab37771d4c

                                              SHA256

                                              bdec91a5061c6a400ef33c2dca5b1d0c16c1fe9e464f8ec99a72442b752e6a97

                                              SHA512

                                              5ea1b33784438acd246c02c95716f72c78293bc8d8e8e6d71aeaab370ae9fc2063ba8ffa443bbfc26c96e45a95549b62894b846a459c986531b34a110d0be38d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                              Filesize

                                              24KB

                                              MD5

                                              0e98d1679e15688ad133f11eee8458ee

                                              SHA1

                                              a4b1a83f0a3f2867954d3146d95d314441950606

                                              SHA256

                                              8aa7eaf918f2969424996a8f3575478006d9d74b308a750f996fe4f5f045554e

                                              SHA512

                                              eb34d52a8df4992444000a93c8d0d11254069b5f43a68a6def21061be03a538f36c42b2e968a8637f12b93235de3140002b0212aa2cdebe0950fd115c04bc72f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                              Filesize

                                              72B

                                              MD5

                                              fe65bb142f29bdd5b37cedfd2015777d

                                              SHA1

                                              f8e6f9ef385981b9de8771a3f2ab433bfbaae39f

                                              SHA256

                                              5961a59420ea46f3a4b378d2f1430f55a14894d51a28bdd59edad3c5c73ca3bc

                                              SHA512

                                              bd8730413f553baf71faed015eb1728ca748a89414323a06390888faf776d4576c32509797ba52067ca354ddca21015e7c7ff6688c6a1335b5bab37870b41b96

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe583479.TMP

                                              Filesize

                                              48B

                                              MD5

                                              5e7dac7e74e39be0f7eff78154de6de0

                                              SHA1

                                              574d4bf0eb96362f950b6c356216c1c1db83ad5b

                                              SHA256

                                              a9abefba5782e40480a0d1791666458dfa216a2b1e1e16b0d64ce5236e6ff2c5

                                              SHA512

                                              4dc1cafe2f2dcf952497d2f44edc8683970b9c07a5b6edf7acd315bc051a4f34f4666cc862747d1eb1e14d747ec23f01e6640610e8f5c2a5d1da0cc32e13ee18

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                              Filesize

                                              41B

                                              MD5

                                              5af87dfd673ba2115e2fcf5cfdb727ab

                                              SHA1

                                              d5b5bbf396dc291274584ef71f444f420b6056f1

                                              SHA256

                                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                              SHA512

                                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              8KB

                                              MD5

                                              86609c53e5db902f231742683b6ef9c2

                                              SHA1

                                              3c5023179d98676537b4a63948480fd22524fb27

                                              SHA256

                                              20c605f5d1956fb4e2b1899c7984017b73140557cc7775949330bb0df0bcdf2e

                                              SHA512

                                              e27a20c169b5f3309a20109c38e815d6958ca26b62feede8b9eaadc40ec4181acdf634d2cb9b9d75e5dff52e686fcf660ca9ecbac8439ff7f93f22062fa92fbf

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Analytics.dll

                                              Filesize

                                              32KB

                                              MD5

                                              1c2bd080b0e972a3ee1579895ea17b42

                                              SHA1

                                              a09454bc976b4af549a6347618f846d4c93b769b

                                              SHA256

                                              166e1a6cf86b254525a03d1510fe76da574f977c012064df39dd6f4af72a4b29

                                              SHA512

                                              946e56d543a6d00674d8fa17ecd9589cba3211cfa52c978e0c9dab0fa45cdfc7787245d14308f5692bd99d621c0caca3c546259fcfa725fff9171b144514b6e0

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\DotNetZip.dll

                                              Filesize

                                              461KB

                                              MD5

                                              a999d7f3807564cc816c16f862a60bbe

                                              SHA1

                                              1ee724daaf70c6b0083bf589674b6f6d8427544f

                                              SHA256

                                              8e9c0362e9bfb3c49af59e1b4d376d3e85b13aed0fbc3f5c0e1ebc99c07345f3

                                              SHA512

                                              6f1f73314d86ae324cc7f55d8e6352e90d4a47f0200671f7069daa98592daaceea34cf89b47defbecdda7d3b3e4682de70e80a5275567b82aa81b002958e4414

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\EnableLoopback.exe

                                              Filesize

                                              82KB

                                              MD5

                                              81564947d42846910eec2d08310e0d25

                                              SHA1

                                              b7a167dcd3afb29c8a0e18c943d634e3fc58a44c

                                              SHA256

                                              543f16b73f7d40177585332f433ce76dddc1526e12bcd62cb73edd11eb002341

                                              SHA512

                                              8f06409517697b022787bc9e2ed7e73100018422177aa3f63ecb406c3bdb6b021624f909a16fca0430002bfa7d35a461b38750c79c0273a154f63316b4e13037

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe

                                              Filesize

                                              3.5MB

                                              MD5

                                              87bc17f56e744e74408e6ae8bb28b724

                                              SHA1

                                              3aa572388083ff00a95405d34d1189c99c7ff5be

                                              SHA256

                                              ffb24fc36ade87988f9908e848d0333ce7ffb2b4e4d0ffb43f6556246069d057

                                              SHA512

                                              cbeee155c97b87a22b92b808f86fee25c18db51ab43a36b657d532d2d47d3a7db2f4507a699b72af904bf6d5ed851d1ae1fcfb4833a57096e6c7787211c0f35d

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe.config

                                              Filesize

                                              261B

                                              MD5

                                              c2edc7b631abce6db98b978995561e57

                                              SHA1

                                              5b1e7a3548763cb6c30145065cfa4b85ed68eb31

                                              SHA256

                                              e59afc2818ad61c1338197a112c936a811c5341614f4ad9ad33d35c8356c0b14

                                              SHA512

                                              5bef4b5487ecb4226544ef0f68d17309cf64bfe52d5c64732480a10f94259b69d2646e4c1b22aa5c80143a4057ee17b06239ec131d5fe0af6c4ab30e351faba2

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\GA.Analytics.Monitor.dll

                                              Filesize

                                              52KB

                                              MD5

                                              6f9e5c4b5662c7f8d1159edcba6e7429

                                              SHA1

                                              c7630476a50a953dab490931b99d2a5eca96f9f6

                                              SHA256

                                              e3261a13953f4bedec65957b58074c71d2e1b9926529d48c77cfb1e70ec68790

                                              SHA512

                                              78fd28a0b19a3dae1d0ae151ce09a42f7542de816222105d4dafe1c0932586b799b835e611ce39a9c9424e60786fbd2949cabac3f006d611078e85b345e148c8

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Newtonsoft.Json.dll

                                              Filesize

                                              695KB

                                              MD5

                                              195ffb7167db3219b217c4fd439eedd6

                                              SHA1

                                              1e76e6099570ede620b76ed47cf8d03a936d49f8

                                              SHA256

                                              e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                              SHA512

                                              56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\ScriptEditor\QWhale.Common.dll

                                              Filesize

                                              192KB

                                              MD5

                                              ac80e3ca5ec3ed77ef7f1a5648fd605a

                                              SHA1

                                              593077c0d921df0819d48b627d4a140967a6b9e0

                                              SHA256

                                              93b0f5d3a2a8a82da1368309c91286ee545b9ed9dc57ad1b31c229e2c11c00b5

                                              SHA512

                                              3ecc0fe3107370cb5ef5003b5317e4ea0d78bd122d662525ec4912dc30b8a1849c4fa2bbb76e6552b571f156d616456724aee6cd9495ae60a7cb4aaa6cf22159

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\ScriptEditor\QWhale.Editor.dll

                                              Filesize

                                              816KB

                                              MD5

                                              eaa268802c633f27fcfc90fd0f986e10

                                              SHA1

                                              21f3a19d6958bcfe9209df40c4fd8e7c4ce7a76f

                                              SHA256

                                              fe26c7e4723bf81124cdcfd5211b70f5e348250ae74b6c0abc326f1084ec3d54

                                              SHA512

                                              c0d6559fc482350c4ed5c5a9a0c0c58eec0a1371f5a254c20ae85521f5cec4c917596bc2ec538c665c3aa8e7ee7b2d3d322b3601d69b605914280ff38315bb47

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\ScriptEditor\QWhale.Syntax.dll

                                              Filesize

                                              228KB

                                              MD5

                                              3be64186e6e8ad19dc3559ee3c307070

                                              SHA1

                                              2f9e70e04189f6c736a3b9d0642f46208c60380a

                                              SHA256

                                              79a2c829de00e56d75eeb81cd97b04eae96bc41d6a2dbdc0ca4e7e0b454b1b7c

                                              SHA512

                                              7d0e657b3a1c23d13d1a7e7d1b95b4d9280cb08a0aca641feb9a89e6b8f0c8760499d63e240fe9c62022790a4822bf4fe2c9d9b19b12bd7f0451454be471ff78

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\SetupHelper

                                              Filesize

                                              18KB

                                              MD5

                                              b1827fca38a5d49fb706a4a7eee4a778

                                              SHA1

                                              95e342f3b6ee3ebc34f98bbb14ca042bca3d779f

                                              SHA256

                                              77523d1504ab2c0a4cde6fcc2c8223ca1172841e2fd9d59d18e5fc132e808ae2

                                              SHA512

                                              41be41372fe3c12dd97f504ebabb70ce899473c0c502ff7bfeaddc748b223c4a78625b6481dbab9cb54c10615e62b8b2dbe9a9c08eb2f69c54ebf5933efbeb1b

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Telerik.NetworkConnections.dll

                                              Filesize

                                              34KB

                                              MD5

                                              798d6938ceab9271cdc532c0943e19dc

                                              SHA1

                                              5f86b4cd45d2f1ffae1153683ce50bc1fb0cd2e3

                                              SHA256

                                              fb90b6e76fdc617ec4ebf3544da668b1f6b06c1debdba369641c3950cab73dd2

                                              SHA512

                                              644fde362f032e6e479750696f62e535f3e712540840c4ca27e10bdfb79b2e5277c82a6d8f55f678e223e45f883776e7f39264c234bc6062fc1865af088c0c31

                                            • C:\Users\Admin\AppData\Local\Temp\nsp6C86.tmp\FiddlerSetup.exe

                                              Filesize

                                              4.4MB

                                              MD5

                                              c2a0eb6f104eacec3f39581451ee208f

                                              SHA1

                                              9ae7d02aeb640fbd090dfc01885b98dd5dd0b6cc

                                              SHA256

                                              1f926cc353301e547e76c6d2eff23fcbe85495ba0292174cc6344fac26457af8

                                              SHA512

                                              8b062e4f0af1dce3a12b5776646fe8c235f30de6772f579da1a6ab2bb559ed69b3bd32af95eee248c48008ddcbd40a7e49eae722a44bc9b49dd13fe38113a3ca

                                            • C:\Users\Admin\AppData\Local\Temp\nsvA191.tmp\System.dll

                                              Filesize

                                              12KB

                                              MD5

                                              192639861e3dc2dc5c08bb8f8c7260d5

                                              SHA1

                                              58d30e460609e22fa0098bc27d928b689ef9af78

                                              SHA256

                                              23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

                                              SHA512

                                              6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                              Filesize

                                              3KB

                                              MD5

                                              8c40537a4d441fe1919a81e9e8b05859

                                              SHA1

                                              dcb4f81bdc14293c5db7c1f7e1cdfb0c891ee0a1

                                              SHA256

                                              35c6daaaa3137ded431f0772c5e70a5c05010b97ff682bf74ada639d862710e4

                                              SHA512

                                              ff25e8d5588b3d21f2096923b947ab1a18f017c00320b25436d620a2b8939ccb08c873cde025dd61fe9d6e9163226bc309a18c04986486ef1a88d96ad02928f9

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                              Filesize

                                              3KB

                                              MD5

                                              e97a47958b446eda20bbc0ec1d4f9ab8

                                              SHA1

                                              60f31a3fdb04310944c4ce305d7a68ba399e85a2

                                              SHA256

                                              27799c8a4584de1b914ce2a642615d58ebcad8d9763e9c1ba313bdd59b7aa5d4

                                              SHA512

                                              67c271a3158c425c516eb512e7a77df8473840e045f1fc38d009d0bed7f3aae1e7873eb0fc1a331f757158a07b40975f14e00e0be44dea4723265ff3cd5d97f2

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\EnableLoopback\a8e9750dcec3b7be6005a908fe2c2d8f\EnableLoopback.ni.exe

                                              Filesize

                                              160KB

                                              MD5

                                              0965e5069f4a44a943dd21af16ebea50

                                              SHA1

                                              4a6866a29d58672a05cdbf764a45c2b682e0cd5f

                                              SHA256

                                              2bf8d3166b4b3725564dfdf44072a6fe10c3a08574d7f5ac17aa80d7d3edc29b

                                              SHA512

                                              394c6c71bea21aebbc9f625a360e33fbb7512e919988db106c7e4120afd6c8d0b945d3238ae2a7d5f0af2c71122d57bfd8d56133f70ad00e78b65ea9ee7e84db

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.JScript\180d439c36f3cf6ec5649e1360f67487\Microsoft.JScript.ni.dll

                                              Filesize

                                              2.7MB

                                              MD5

                                              a2ef1f6d5df4e7b6447b54190a3b6ccc

                                              SHA1

                                              cbeb2b07942b3d9b95d3a7263629bcbec6b25ce1

                                              SHA256

                                              2b14dbd9d9c8050100f813b1e51942520d49ab51ef8ffde16414ac8b35765dd4

                                              SHA512

                                              f089315b0435d8f0cfd8523698a36205cbc493cb2ea1c561d811e9141423df20640107ad3507abba44575b970dc010d380fee6e6f3880fc8f91f63f66e000f77

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.JScript\180d439c36f3cf6ec5649e1360f67487\Microsoft.JScript.ni.dll.aux

                                              Filesize

                                              580B

                                              MD5

                                              b094143c78c988ef07a1bf541fccf4e6

                                              SHA1

                                              978ba20e486e74fba9cf306a7450240a96cc314c

                                              SHA256

                                              e6a53272d081895d24999b96ab02509ef5ac6a30a1ef901dad3f9e62252d8f80

                                              SHA512

                                              88eb0924df8c56a1e711b87f1a548b73aa18c90a197a3733c601e90793a4e74a0c771bd764e45111832196b2f81ebd90393c21053b3a93c7d85deee5eb536f5e

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\6c172340af3f46e7e45d3cea5ee80a56\System.Data.SqlXml.ni.dll

                                              Filesize

                                              3.0MB

                                              MD5

                                              942af167f631f760c83a8ada0592cb82

                                              SHA1

                                              73c08eec36472b200554465ee5d6e3f7792704ed

                                              SHA256

                                              c662e6d62258cfc15fb0fbb98fc3b428955ba2d7bbceced1e4f87a66d16b173b

                                              SHA512

                                              55944b185f4799fa81cd03d4131d6f24506d3b8329c7a0800aae486d9e75d2dcbbef2e564e4d86cfe7bc880a2bf6bac083ccb995429061666333dc56fef68418

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\6c172340af3f46e7e45d3cea5ee80a56\System.Data.SqlXml.ni.dll.aux

                                              Filesize

                                              708B

                                              MD5

                                              3c3231d300935c65976ed0ca2d93f346

                                              SHA1

                                              70611f15414423d2cb6db3d8bbb384e98df4996f

                                              SHA256

                                              96ae9bed2a9512ea7858cc3b28dc28d172cd1c3c15f60fa04ee20b8063a1b1a3

                                              SHA512

                                              28f2c7dd019085cd18995232f2a87ea45b834f08d1d4923b799917eceea6d3dfc8b1c1caf7c0a2fb215df79defd095e1d70eda12c2c75475a57e84225da9d666

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Deployment\88b596885c6a2aecfe43892d03c5ba6b\System.Deployment.ni.dll

                                              Filesize

                                              3.0MB

                                              MD5

                                              2ad389cde81c8ddc7056e7eba382c92d

                                              SHA1

                                              99eebd8f5e3471efd5e13555426c279eb1051a17

                                              SHA256

                                              de3a8589468a14dc7a61d19be614081d4b5000ae1604d81894f3399611e4e328

                                              SHA512

                                              692e35cf3f0c2351eca65f139975c8c621e60b9a7a88ab12f5d60517e6f3ead20a2b04b47c5f360090d05527e9435ba620776712474829110e67fae25619e7bd

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\0c073f42cf7c0b89bd4ceb4244060ceb\System.Numerics.ni.dll

                                              Filesize

                                              314KB

                                              MD5

                                              73699d2573263453632fe45cff1dc094

                                              SHA1

                                              b3df4e2af5e7520eca101c52e7145a85d29ee5df

                                              SHA256

                                              cc1326839110e27d2cbf5cf72d74e36ebe6346f65993353cf7c8ea5afd4be381

                                              SHA512

                                              489630de5b13fc1cc0ac6c93baa76b9a31da0fa48b9f53fe40d55606d3b5b344fb5bd10e549194a4187f90bb605c39b9d46ba34d93e9436862984b6688f5a71a

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\0c073f42cf7c0b89bd4ceb4244060ceb\System.Numerics.ni.dll.aux

                                              Filesize

                                              300B

                                              MD5

                                              905fbaf34d730796e231f38c60feffeb

                                              SHA1

                                              a8f995d3b27f6ea0feb485870832560025b50e4e

                                              SHA256

                                              b04b3113d61b1756e9b8087df88533276adaab7ece3d4e18cba1e956f662f21e

                                              SHA512

                                              4716d2ea8f71362bb5264a69abd252276fda352712ef89a7433c66366907a47b96ce3c50925a9036f9f378e5e67de2f94a2a74a4c99ca97930ef6b274c60f6f2

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Runt9064068c#\ab300698ff0e6328a779058c8a6abc9a\System.Runtime.Serialization.Formatters.Soap.ni.dll

                                              Filesize

                                              345KB

                                              MD5

                                              fa423347a2e17ce6ad208963bcccea75

                                              SHA1

                                              bfbe02326cbc38d16fcb7c18ae93cd5b19ef1bf4

                                              SHA256

                                              36182d6b01a0529c83f20732a1a62430d3f446bed2a8094b4a5b57423228973d

                                              SHA512

                                              3d99f29b8c16fe568d1f2771faad856446da626f7dc368944b4d315d1a6f603c900c70f44346febecc3f709871c3efa37afaf227ac10de81eb30ea0268f54cd0

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\42c7a19a453afb14fda2fe8479e4d8b2\System.Security.ni.dll

                                              Filesize

                                              986KB

                                              MD5

                                              898474cba76cf084b5d914c0f2f8f07c

                                              SHA1

                                              8a93edb2b46038c0e4b916f8d48c96abe0cfc241

                                              SHA256

                                              f2fd3ae74d836a4f971b4d8eccb109e27cd9e9f8d62ae8a4dd248828d4c936e0

                                              SHA512

                                              d1fae5172a4fed48fefc78954390ce356936a3bfb2331640355bc9c3659585b2f1aeda897a2c490586934682083522839b691b45fb2205c87c4cab926d5d5640

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\42c7a19a453afb14fda2fe8479e4d8b2\System.Security.ni.dll.aux

                                              Filesize

                                              912B

                                              MD5

                                              2919ee7ce3a32fb9281b48b99fb0b92c

                                              SHA1

                                              6aab45597d8a120a9373bac86fe3cbb19ff8e470

                                              SHA256

                                              d00cbd723a0870bc12e155e0edd51defcec623bb0c8fe0e927ea196da545e6a2

                                              SHA512

                                              b6fdbc82671af88a79e1ea6e0942a493e13a3c2527f3512079dd48b62ca704d988311ce33a944556766cea64d1b4be5460920de938c2e0ac6975e4ec55c714c1

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Web\debe458f6197408829bf76c18c262527\System.Web.ni.dll

                                              Filesize

                                              16.2MB

                                              MD5

                                              6ec78f886589d95ea7f788af3923deb5

                                              SHA1

                                              d5247883bfc4f7bf92cc1d3e062eccf89a31f3c1

                                              SHA256

                                              4e01f30dcb3ee4cde2ba0d9cebe4958c7ed16b55d549b29559989104c2e8ebba

                                              SHA512

                                              9a5375a435f1d11903a7964fe89c31df168ab96ab1c23835705b46fe5c162aebef2df7b2594caad97868dbb97015ee1c0b6241d687034267cdd2d1fad5e7bb8c

                                            • C:\Windows\assembly\temp\KWH0B87NA1\System.Runtime.Serialization.Formatters.Soap.ni.dll.aux

                                              Filesize

                                              644B

                                              MD5

                                              659b7690365e7746edfe6e96c3f11d6d

                                              SHA1

                                              fdcd84bb30c5c8adeb6c9341dcba873ad3994c07

                                              SHA256

                                              95129a62658451e9a013e7f482bebbd2fd48c2925dca596ade2b5b9bcaa23309

                                              SHA512

                                              fc52c330aa042ab816e739f117e1fc0208ea8855ec6a9e19b8e3ab42b18af61794429ae85d1b8b9d902c06ae64897215e721c66674b64b31f7ca6c91034af985

                                            • C:\Windows\assembly\temp\U8KF9UZ41S\System.Deployment.ni.dll.aux

                                              Filesize

                                              1KB

                                              MD5

                                              218a0ba6f4d67451c5de690e2d79a50b

                                              SHA1

                                              2d88b63c563de1335f76678a7736d16ad0107f77

                                              SHA256

                                              5b3d423230067b3cd4270224ff23c0f65c4f0309525f3f0e8a9ecd4b05f633f5

                                              SHA512

                                              98043423bbfa6d92ce2b1077639a53ebbbe4af7fb24553e22f34ae68cc5b49d79df7d3ae6a6035567978787bbf467f7ebedc55ff3c8add1c3a20f19cf2f5acf3

                                            • memory/1200-104-0x0000000000500000-0x0000000000508000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/1664-436-0x0000064449980000-0x00000644499D8000-memory.dmp

                                              Filesize

                                              352KB

                                            • memory/2176-353-0x0000064443EC0000-0x0000064443F11000-memory.dmp

                                              Filesize

                                              324KB

                                            • memory/2176-473-0x000006443CC40000-0x000006443CEF8000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/2496-240-0x00000644451A0000-0x00000644454A4000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/3608-330-0x0000064449A20000-0x0000064449B18000-memory.dmp

                                              Filesize

                                              992KB

                                            • memory/4164-206-0x00000193C7B90000-0x00000193C7BE0000-memory.dmp

                                              Filesize

                                              320KB

                                            • memory/4164-209-0x00000193C8160000-0x00000193C8212000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/4164-221-0x00000193C8B70000-0x00000193C8C92000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/4164-224-0x00000193C83C0000-0x00000193C83FC000-memory.dmp

                                              Filesize

                                              240KB

                                            • memory/4164-219-0x00000193C7C20000-0x00000193C7C3E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/4164-223-0x00000193C80C0000-0x00000193C80E0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/4164-220-0x00000193C80A0000-0x00000193C80BA000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/4164-225-0x00000193C8120000-0x00000193C8132000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4164-218-0x00000193C8410000-0x00000193C8454000-memory.dmp

                                              Filesize

                                              272KB

                                            • memory/4164-215-0x00000193C7A40000-0x00000193C7A52000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/4164-217-0x00000193C80E0000-0x00000193C8112000-memory.dmp

                                              Filesize

                                              200KB

                                            • memory/4164-216-0x00000193C7A60000-0x00000193C7A80000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/4164-214-0x00000193C8F10000-0x00000193C93DC000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4164-211-0x00000193C7BE0000-0x00000193C7C1A000-memory.dmp

                                              Filesize

                                              232KB

                                            • memory/4164-106-0x00000193C7C50000-0x00000193C7FD4000-memory.dmp

                                              Filesize

                                              3.5MB

                                            • memory/4164-212-0x00000193AF710000-0x00000193AF72C000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/4164-210-0x00000193AF770000-0x00000193AF792000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/4164-222-0x00000193C8460000-0x00000193C84DE000-memory.dmp

                                              Filesize

                                              504KB

                                            • memory/4164-109-0x00000193C7A80000-0x00000193C7B3A000-memory.dmp

                                              Filesize

                                              744KB

                                            • memory/4164-208-0x00000193AF740000-0x00000193AF762000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/4164-207-0x00000193C8230000-0x00000193C83B8000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/4164-227-0x00000193ADA90000-0x00000193ADAA0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4164-196-0x00000193C8510000-0x00000193C8A38000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/4164-205-0x00000193ADA70000-0x00000193ADA7C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/4164-198-0x00000193C79C0000-0x00000193C7A3A000-memory.dmp

                                              Filesize

                                              488KB

                                            • memory/4164-203-0x00000193C7FE0000-0x00000193C8092000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/4164-201-0x00000193C7B40000-0x00000193C7B8A000-memory.dmp

                                              Filesize

                                              296KB

                                            • memory/4164-200-0x00000193ADA60000-0x00000193ADA6C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/4176-578-0x00000644C00C0000-0x00000644C10EA000-memory.dmp

                                              Filesize

                                              16.2MB

                                            • memory/4176-556-0x000001FE6D6E0000-0x000001FE6D706000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/4584-412-0x0000064445320000-0x000006444561E000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/5564-626-0x0000022342F90000-0x0000022342FA8000-memory.dmp

                                              Filesize

                                              96KB

                                            • memory/5852-630-0x0000064488000000-0x000006448802B000-memory.dmp

                                              Filesize

                                              172KB