Resubmissions

11-12-2024 18:37

241211-w9f3rstpez 10

11-12-2024 18:28

241211-w4jayatnat 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    11-12-2024 18:28

General

  • Target

    $PLUGINSDIR/FiddlerSetup.exe

  • Size

    4.4MB

  • MD5

    c2a0eb6f104eacec3f39581451ee208f

  • SHA1

    9ae7d02aeb640fbd090dfc01885b98dd5dd0b6cc

  • SHA256

    1f926cc353301e547e76c6d2eff23fcbe85495ba0292174cc6344fac26457af8

  • SHA512

    8b062e4f0af1dce3a12b5776646fe8c235f30de6772f579da1a6ab2bb559ed69b3bd32af95eee248c48008ddcbd40a7e49eae722a44bc9b49dd13fe38113a3ca

  • SSDEEP

    98304:KgxyUnSAaB1eXq8yOkLiGXv72Qomw6pvtFIAwdaRdAM:KoWvePjqHv72Qo96pvtF5wHM

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 20 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 37 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\FiddlerSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\FiddlerSetup.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="FiddlerProxy"
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:1464
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="FiddlerProxy" program="C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe" action=allow profile=any dir=in edge=deferuser protocol=tcp description="Permit inbound connections to Fiddler"
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:392
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" install "C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe"
      2⤵
        PID:3720
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 0 -NGENProcess 1e4 -Pipe 1ec -Comment "NGen Worker Process"
          3⤵
            PID:400
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 0 -NGENProcess 1e4 -Pipe 284 -Comment "NGen Worker Process"
            3⤵
              PID:2064
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 0 -NGENProcess 294 -Pipe 298 -Comment "NGen Worker Process"
              3⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:2736
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 0 -NGENProcess 2d0 -Pipe 2d4 -Comment "NGen Worker Process"
              3⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:1716
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 0 -NGENProcess 2c4 -Pipe 1e4 -Comment "NGen Worker Process"
              3⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:2020
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ac -InterruptEvent 0 -NGENProcess 2e4 -Pipe 1f4 -Comment "NGen Worker Process"
              3⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:5076
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 0 -NGENProcess 2cc -Pipe 2d0 -Comment "NGen Worker Process"
              3⤵
              • Loads dropped DLL
              PID:3552
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 0 -NGENProcess 29c -Pipe 2d8 -Comment "NGen Worker Process"
              3⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:3508
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2cc -InterruptEvent 0 -NGENProcess 29c -Pipe 294 -Comment "NGen Worker Process"
              3⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:3460
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2a4 -InterruptEvent 0 -NGENProcess 2f0 -Pipe 2c8 -Comment "NGen Worker Process"
              3⤵
              • Loads dropped DLL
              • Drops file in Windows directory
              PID:2532
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 0 -NGENProcess 29c -Pipe 310 -Comment "NGen Worker Process"
              3⤵
              • Drops file in Windows directory
              PID:1464
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e4 -InterruptEvent 0 -NGENProcess 2cc -Pipe 2e0 -Comment "NGen Worker Process"
              3⤵
              • Drops file in Windows directory
              PID:3224
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 0 -NGENProcess 314 -Pipe 2a4 -Comment "NGen Worker Process"
              3⤵
              • Drops file in Windows directory
              PID:1800
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2fc -InterruptEvent 0 -NGENProcess 314 -Pipe 330 -Comment "NGen Worker Process"
              3⤵
              • Drops file in Windows directory
              PID:1224
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 318 -InterruptEvent 0 -NGENProcess 31c -Pipe 2f0 -Comment "NGen Worker Process"
              3⤵
              • Drops file in Windows directory
              PID:2160
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 320 -InterruptEvent 0 -NGENProcess 2fc -Pipe 328 -Comment "NGen Worker Process"
              3⤵
              • Drops file in Windows directory
              PID:5076
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" install "C:\Users\Admin\AppData\Local\Programs\Fiddler\EnableLoopback.exe"
            2⤵
              PID:788
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1f4 -InterruptEvent 0 -NGENProcess 1e4 -Pipe 1f0 -Comment "NGen Worker Process"
                3⤵
                  PID:3852
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 0 -NGENProcess 28c -Pipe 290 -Comment "NGen Worker Process"
                  3⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:1052
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 0 -NGENProcess 278 -Pipe 280 -Comment "NGen Worker Process"
                  3⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:1168
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2e0 -InterruptEvent 0 -NGENProcess 2c4 -Pipe 2dc -Comment "NGen Worker Process"
                  3⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:1960
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 0 -NGENProcess 2e8 -Pipe 2e4 -Comment "NGen Worker Process"
                  3⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:4660
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 0 -NGENProcess 2c4 -Pipe 2c8 -Comment "NGen Worker Process"
                  3⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:2440
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 2ec -InterruptEvent 0 -NGENProcess 2b0 -Pipe 2e8 -Comment "NGen Worker Process"
                  3⤵
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  PID:1932
              • C:\Users\Admin\AppData\Local\Programs\Fiddler\SetupHelper
                "C:\Users\Admin\AppData\Local\Programs\Fiddler\SetupHelper" /a "C:\Users\Admin\AppData\Local\Programs\Fiddler"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3552
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://fiddler2.com/r/?Fiddler2FirstRun
                2⤵
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:2448
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x140,0x144,0x148,0x11c,0x14c,0x7ff85cf446f8,0x7ff85cf44708,0x7ff85cf44718
                  3⤵
                    PID:1424
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:2
                    3⤵
                      PID:2356
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:3
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3612
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8
                      3⤵
                        PID:3440
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                        3⤵
                          PID:3392
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                          3⤵
                            PID:1880
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:1
                            3⤵
                              PID:4704
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:1
                              3⤵
                                PID:1388
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5736 /prefetch:8
                                3⤵
                                  PID:4104
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5780 /prefetch:8
                                  3⤵
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1168
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:1
                                  3⤵
                                    PID:3448
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:1
                                    3⤵
                                      PID:3680
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4208 /prefetch:8
                                      3⤵
                                        PID:3272
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4208 /prefetch:8
                                        3⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5076
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:1
                                        3⤵
                                          PID:4616
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6612 /prefetch:1
                                          3⤵
                                            PID:3720
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                            3⤵
                                            • Drops file in Program Files directory
                                            PID:2060
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x264,0x268,0x26c,0x244,0x270,0x7ff71e905460,0x7ff71e905470,0x7ff71e905480
                                              4⤵
                                                PID:5020
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,12881242928851703168,540167395797643900,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3172 /prefetch:2
                                              3⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2996
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:1712
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:1284

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              165b9ab5b6100e149d42942970795741

                                              SHA1

                                              873ef2b7bb080cee1f9eb80920edb54a235fc326

                                              SHA256

                                              fd01e423cf1b8c61bbc4e1c63f3cd70a81586a9d03a88eebd6ec3a16a1910364

                                              SHA512

                                              5ba31ba647b158325e7282ff6dc83e683b62895a1e3ebd5445a1f121d6d5fdee4b39164514f7c442bf67dbefcc7965c3ee946333e77047ced40df144aebef9ad

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              4c3b681f1b553061b1d406dca73509e1

                                              SHA1

                                              1d0902a780b041766c456dca466ed6dd88db979a

                                              SHA256

                                              45099d50c298e321f628997d58aff82c1f91aa302cb6a46f5c8a2819a53685d2

                                              SHA512

                                              b6e59b2da8bce61cdb2f0bdbe6dd0486c68bb583a1066cafb979314c4c1baeab4136d9d958e9e9ef3a36b1d7988ae8518080b8aff9748c102d05646aea914283

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              48B

                                              MD5

                                              eb03a413e6eb835ed84176cb619c7ae1

                                              SHA1

                                              99dcbc28c42ae508329b17a404da08d570a7a674

                                              SHA256

                                              b69dede4c5b4b23dc13638dec6791b5e63b0fcf378c2f5d136fea7c34e8d021f

                                              SHA512

                                              f651ff10276bfe3073b253207b0a2d42b31dd0f8ee96d1825b4aca5a0989b23964aa129a6dca96831d28f484b762a02c0209cc0a16012cb7730454fec7472751

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              624B

                                              MD5

                                              9b56f88093280211905882429b863ed8

                                              SHA1

                                              316b278d1b41cde53a16c8a1af05b10a039749db

                                              SHA256

                                              56b2884930c19cfa2543f8eaf514768af7c5397c89a6be7dff19ab65c8a24816

                                              SHA512

                                              b789d1356f847b44edaa21d532d6d2f7807faf64b1a0f5897a63585a79446845d8b60aa880101c65f65a24ede0f12260ad86cebbad462a0fcbd1befc8c52a4c8

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                              Filesize

                                              70KB

                                              MD5

                                              e5e3377341056643b0494b6842c0b544

                                              SHA1

                                              d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                              SHA256

                                              e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                              SHA512

                                              83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              111B

                                              MD5

                                              285252a2f6327d41eab203dc2f402c67

                                              SHA1

                                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                              SHA256

                                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                              SHA512

                                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              2KB

                                              MD5

                                              2c72ac4ff31ab037ea8c5339acd73486

                                              SHA1

                                              b73d7a5957870e47546cb2a81e9b8d82f7b9fcfa

                                              SHA256

                                              970f4c02a8c9a35bcb213a5370f79244f53a3559e61dc340838ecb54dd30681e

                                              SHA512

                                              57d2e44dd6957c4d631cf479e7047d446be5ee92b390bb0fadeaef1f1fe3b87acda29e87d1f49d2ef4e771580b6ea2462a082aac8d41aea74330c3f5a25b0e72

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              4KB

                                              MD5

                                              cbd84d67b75c70d0d4f0a3b459d2a353

                                              SHA1

                                              9f9954d469c8357cec00afbfb40d1110584e3333

                                              SHA256

                                              1789e284aa3364d1c4d762fcf5a5bf49744606fe13aca7d4867db3401eebb7e7

                                              SHA512

                                              10b58ecf0c0933a7833cbbb656745ccb9ca15d4a5c8ad0a178d699f44aabfeb1dab41f4da591c1f46b845b8e60cf13b1382c8076e4cd00f907809cfa639146ca

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              a80ce86d49874a757a546e34e4d7e7c4

                                              SHA1

                                              d859b9ba82230ae947d1472dfc9c0d256bd94108

                                              SHA256

                                              2e2090d1985b1b597a275fee94fb2f9ce51e563688c7c4788d7380ae3ad407d2

                                              SHA512

                                              4361e5f809b7837b8f5c74eca5244d7178e770c060f7779ced56c98ab69ae8a618936e8c82217a34215a357285b937366a8b5319aa8aa17745c11e73b16d32f8

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              c992a8a1506f850fdf735f2962c89143

                                              SHA1

                                              34e2192b7fdc6af152b97e136779e4be627d74f1

                                              SHA256

                                              5c5bcfb08cd3a34b49bed2d84591ae99b6993db2ac9c7a0769a6d8e503558991

                                              SHA512

                                              e90caf49d4827c199d1ee1e4876f7dd7141c147771420c0a15cf3c309ac0540e39076ddd3467516030270f3849566d85e6df2d9d7560837fea2284444d647e37

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                              Filesize

                                              24KB

                                              MD5

                                              524c0eba78201e8faad29c29d0a611ff

                                              SHA1

                                              b8d23f3f70313f9f0f8c1e293e70a3f8173adea9

                                              SHA256

                                              693ac11a04057152b30e8d26dc646186c3e54bbe397122b457374d92620fde52

                                              SHA512

                                              5481d83540551f9999d6dbbe94c7ac200b53bb81e5d9a5a94761274332a0b4e4aad05a9689fed5b9ad6fb2c1d06f91e2730eaa4f53950f8e14cef5cf2af452ce

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                              Filesize

                                              24KB

                                              MD5

                                              eeec2e8fdb3d10926be7f7f005a6add4

                                              SHA1

                                              ef91d915a57451a526ffde4634f1152c6a751104

                                              SHA256

                                              3a35c99ef359936c246b01412cf6c3bd0a7b190fbfefa584d62cc27e6f6522b1

                                              SHA512

                                              c2044601211d75abf5bea962e73760289ec660326f7e8fce5a588a6a7672923682fa45a0876f197ec75c943d780bd06649d1810edb8331a293365dcc415cb4c9

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                              Filesize

                                              72B

                                              MD5

                                              7e62692f81107fb769da599bbe583fb6

                                              SHA1

                                              cb324c6ac88f7d0e15ae1c735fd68184ae451596

                                              SHA256

                                              8b043041337a4f32b7871d3f38da37e638a42a87157a9fa5f7ddc3aa9d74bcba

                                              SHA512

                                              45add60c76c98889ba5062416a4af5cb3d8b91d26396d528dd29e02a1e37759363c835ccb0231274829e27cc3c600f49743d4c7864c51d198d2048298a90aa81

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58407f.TMP

                                              Filesize

                                              48B

                                              MD5

                                              015cf9994d0dfeb8b94d134c834d93ba

                                              SHA1

                                              0a9f887f732f4dec78e2e2dcbbe61336ebc19432

                                              SHA256

                                              f252e63b9cd78bfc6909d15a6df5b62731561b67b04ecbfa516273b2b1c40cef

                                              SHA512

                                              38b2fb523160e00e7c638bb2febb512afc6dadc4434481491338b866329e12ae567bd064ec28074b3cfe1079a15d3c6533e1b1836d737874a3e2f9c31fe7db3a

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                              Filesize

                                              41B

                                              MD5

                                              5af87dfd673ba2115e2fcf5cfdb727ab

                                              SHA1

                                              d5b5bbf396dc291274584ef71f444f420b6056f1

                                              SHA256

                                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                              SHA512

                                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              8KB

                                              MD5

                                              b9c0c1093e173300d78f0fee4bbc1f15

                                              SHA1

                                              6bbc84362ad895aa00692dfdfd464174b601f9b5

                                              SHA256

                                              849a46d02325666dcd38df565eefc37d94c5b49764eb1dfb69ba568b0708c79f

                                              SHA512

                                              4e1321fa19a5b4cea903acaadc5da62ad9cccd7468aa389251e5401c97666104694686f5eb5c5949187d8e4b8fa4f40d7371fdca62ace6e5b2ef6444d1842599

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Analytics.dll

                                              Filesize

                                              32KB

                                              MD5

                                              1c2bd080b0e972a3ee1579895ea17b42

                                              SHA1

                                              a09454bc976b4af549a6347618f846d4c93b769b

                                              SHA256

                                              166e1a6cf86b254525a03d1510fe76da574f977c012064df39dd6f4af72a4b29

                                              SHA512

                                              946e56d543a6d00674d8fa17ecd9589cba3211cfa52c978e0c9dab0fa45cdfc7787245d14308f5692bd99d621c0caca3c546259fcfa725fff9171b144514b6e0

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\DotNetZip.dll

                                              Filesize

                                              461KB

                                              MD5

                                              a999d7f3807564cc816c16f862a60bbe

                                              SHA1

                                              1ee724daaf70c6b0083bf589674b6f6d8427544f

                                              SHA256

                                              8e9c0362e9bfb3c49af59e1b4d376d3e85b13aed0fbc3f5c0e1ebc99c07345f3

                                              SHA512

                                              6f1f73314d86ae324cc7f55d8e6352e90d4a47f0200671f7069daa98592daaceea34cf89b47defbecdda7d3b3e4682de70e80a5275567b82aa81b002958e4414

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\EnableLoopback.exe

                                              Filesize

                                              82KB

                                              MD5

                                              81564947d42846910eec2d08310e0d25

                                              SHA1

                                              b7a167dcd3afb29c8a0e18c943d634e3fc58a44c

                                              SHA256

                                              543f16b73f7d40177585332f433ce76dddc1526e12bcd62cb73edd11eb002341

                                              SHA512

                                              8f06409517697b022787bc9e2ed7e73100018422177aa3f63ecb406c3bdb6b021624f909a16fca0430002bfa7d35a461b38750c79c0273a154f63316b4e13037

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe

                                              Filesize

                                              3.5MB

                                              MD5

                                              87bc17f56e744e74408e6ae8bb28b724

                                              SHA1

                                              3aa572388083ff00a95405d34d1189c99c7ff5be

                                              SHA256

                                              ffb24fc36ade87988f9908e848d0333ce7ffb2b4e4d0ffb43f6556246069d057

                                              SHA512

                                              cbeee155c97b87a22b92b808f86fee25c18db51ab43a36b657d532d2d47d3a7db2f4507a699b72af904bf6d5ed851d1ae1fcfb4833a57096e6c7787211c0f35d

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Fiddler.exe.config

                                              Filesize

                                              261B

                                              MD5

                                              c2edc7b631abce6db98b978995561e57

                                              SHA1

                                              5b1e7a3548763cb6c30145065cfa4b85ed68eb31

                                              SHA256

                                              e59afc2818ad61c1338197a112c936a811c5341614f4ad9ad33d35c8356c0b14

                                              SHA512

                                              5bef4b5487ecb4226544ef0f68d17309cf64bfe52d5c64732480a10f94259b69d2646e4c1b22aa5c80143a4057ee17b06239ec131d5fe0af6c4ab30e351faba2

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\GA.Analytics.Monitor.dll

                                              Filesize

                                              52KB

                                              MD5

                                              6f9e5c4b5662c7f8d1159edcba6e7429

                                              SHA1

                                              c7630476a50a953dab490931b99d2a5eca96f9f6

                                              SHA256

                                              e3261a13953f4bedec65957b58074c71d2e1b9926529d48c77cfb1e70ec68790

                                              SHA512

                                              78fd28a0b19a3dae1d0ae151ce09a42f7542de816222105d4dafe1c0932586b799b835e611ce39a9c9424e60786fbd2949cabac3f006d611078e85b345e148c8

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Newtonsoft.Json.dll

                                              Filesize

                                              695KB

                                              MD5

                                              195ffb7167db3219b217c4fd439eedd6

                                              SHA1

                                              1e76e6099570ede620b76ed47cf8d03a936d49f8

                                              SHA256

                                              e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

                                              SHA512

                                              56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\ScriptEditor\QWhale.Common.dll

                                              Filesize

                                              192KB

                                              MD5

                                              ac80e3ca5ec3ed77ef7f1a5648fd605a

                                              SHA1

                                              593077c0d921df0819d48b627d4a140967a6b9e0

                                              SHA256

                                              93b0f5d3a2a8a82da1368309c91286ee545b9ed9dc57ad1b31c229e2c11c00b5

                                              SHA512

                                              3ecc0fe3107370cb5ef5003b5317e4ea0d78bd122d662525ec4912dc30b8a1849c4fa2bbb76e6552b571f156d616456724aee6cd9495ae60a7cb4aaa6cf22159

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\ScriptEditor\QWhale.Editor.dll

                                              Filesize

                                              816KB

                                              MD5

                                              eaa268802c633f27fcfc90fd0f986e10

                                              SHA1

                                              21f3a19d6958bcfe9209df40c4fd8e7c4ce7a76f

                                              SHA256

                                              fe26c7e4723bf81124cdcfd5211b70f5e348250ae74b6c0abc326f1084ec3d54

                                              SHA512

                                              c0d6559fc482350c4ed5c5a9a0c0c58eec0a1371f5a254c20ae85521f5cec4c917596bc2ec538c665c3aa8e7ee7b2d3d322b3601d69b605914280ff38315bb47

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\ScriptEditor\QWhale.Syntax.dll

                                              Filesize

                                              228KB

                                              MD5

                                              3be64186e6e8ad19dc3559ee3c307070

                                              SHA1

                                              2f9e70e04189f6c736a3b9d0642f46208c60380a

                                              SHA256

                                              79a2c829de00e56d75eeb81cd97b04eae96bc41d6a2dbdc0ca4e7e0b454b1b7c

                                              SHA512

                                              7d0e657b3a1c23d13d1a7e7d1b95b4d9280cb08a0aca641feb9a89e6b8f0c8760499d63e240fe9c62022790a4822bf4fe2c9d9b19b12bd7f0451454be471ff78

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\SetupHelper

                                              Filesize

                                              18KB

                                              MD5

                                              b1827fca38a5d49fb706a4a7eee4a778

                                              SHA1

                                              95e342f3b6ee3ebc34f98bbb14ca042bca3d779f

                                              SHA256

                                              77523d1504ab2c0a4cde6fcc2c8223ca1172841e2fd9d59d18e5fc132e808ae2

                                              SHA512

                                              41be41372fe3c12dd97f504ebabb70ce899473c0c502ff7bfeaddc748b223c4a78625b6481dbab9cb54c10615e62b8b2dbe9a9c08eb2f69c54ebf5933efbeb1b

                                            • C:\Users\Admin\AppData\Local\Programs\Fiddler\Telerik.NetworkConnections.dll

                                              Filesize

                                              34KB

                                              MD5

                                              798d6938ceab9271cdc532c0943e19dc

                                              SHA1

                                              5f86b4cd45d2f1ffae1153683ce50bc1fb0cd2e3

                                              SHA256

                                              fb90b6e76fdc617ec4ebf3544da668b1f6b06c1debdba369641c3950cab73dd2

                                              SHA512

                                              644fde362f032e6e479750696f62e535f3e712540840c4ca27e10bdfb79b2e5277c82a6d8f55f678e223e45f883776e7f39264c234bc6062fc1865af088c0c31

                                            • C:\Users\Admin\AppData\Local\Temp\nseB73C.tmp\System.dll

                                              Filesize

                                              12KB

                                              MD5

                                              192639861e3dc2dc5c08bb8f8c7260d5

                                              SHA1

                                              58d30e460609e22fa0098bc27d928b689ef9af78

                                              SHA256

                                              23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

                                              SHA512

                                              6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                              Filesize

                                              3KB

                                              MD5

                                              5805b3d109f01f4df1080efce1c27816

                                              SHA1

                                              435cd6c41007458906e7dc0d85c0d1940ba99562

                                              SHA256

                                              3e6ed38b9f26e2e78a2ff04939607f1213746d4dbabf5af8060b15c67a6fdfd1

                                              SHA512

                                              89b91d7716cfd4fabb6228f151d6b548ac783cd63264860d81b43667542e14d12c5136740141721d957a65daeb068e7ef34d16deb1b128ed6cddd9764fbb175c

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                              Filesize

                                              3KB

                                              MD5

                                              4f645d79474453c836197693a83fc50a

                                              SHA1

                                              5ebec88265602e0191ee5a24d512a932074abf60

                                              SHA256

                                              ab1ffb5a6f7a18ff1c28f6b0bfb33d83433257180c3f9c8850705efcdea4b7df

                                              SHA512

                                              2aa96e9221c81cb1e941949d86793176042a1b75f3a589628212f539adbef2ec909dc88377b359405efaf345d283b87bb6e83831d5bde322e54ee1804bd49a82

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\EnableLoopback\a8e9750dcec3b7be6005a908fe2c2d8f\EnableLoopback.ni.exe

                                              Filesize

                                              160KB

                                              MD5

                                              0965e5069f4a44a943dd21af16ebea50

                                              SHA1

                                              4a6866a29d58672a05cdbf764a45c2b682e0cd5f

                                              SHA256

                                              2bf8d3166b4b3725564dfdf44072a6fe10c3a08574d7f5ac17aa80d7d3edc29b

                                              SHA512

                                              394c6c71bea21aebbc9f625a360e33fbb7512e919988db106c7e4120afd6c8d0b945d3238ae2a7d5f0af2c71122d57bfd8d56133f70ad00e78b65ea9ee7e84db

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.JScript\180d439c36f3cf6ec5649e1360f67487\Microsoft.JScript.ni.dll

                                              Filesize

                                              2.7MB

                                              MD5

                                              a2ef1f6d5df4e7b6447b54190a3b6ccc

                                              SHA1

                                              cbeb2b07942b3d9b95d3a7263629bcbec6b25ce1

                                              SHA256

                                              2b14dbd9d9c8050100f813b1e51942520d49ab51ef8ffde16414ac8b35765dd4

                                              SHA512

                                              f089315b0435d8f0cfd8523698a36205cbc493cb2ea1c561d811e9141423df20640107ad3507abba44575b970dc010d380fee6e6f3880fc8f91f63f66e000f77

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\6c172340af3f46e7e45d3cea5ee80a56\System.Data.SqlXml.ni.dll

                                              Filesize

                                              3.0MB

                                              MD5

                                              942af167f631f760c83a8ada0592cb82

                                              SHA1

                                              73c08eec36472b200554465ee5d6e3f7792704ed

                                              SHA256

                                              c662e6d62258cfc15fb0fbb98fc3b428955ba2d7bbceced1e4f87a66d16b173b

                                              SHA512

                                              55944b185f4799fa81cd03d4131d6f24506d3b8329c7a0800aae486d9e75d2dcbbef2e564e4d86cfe7bc880a2bf6bac083ccb995429061666333dc56fef68418

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Data.SqlXml\6c172340af3f46e7e45d3cea5ee80a56\System.Data.SqlXml.ni.dll.aux

                                              Filesize

                                              708B

                                              MD5

                                              3c3231d300935c65976ed0ca2d93f346

                                              SHA1

                                              70611f15414423d2cb6db3d8bbb384e98df4996f

                                              SHA256

                                              96ae9bed2a9512ea7858cc3b28dc28d172cd1c3c15f60fa04ee20b8063a1b1a3

                                              SHA512

                                              28f2c7dd019085cd18995232f2a87ea45b834f08d1d4923b799917eceea6d3dfc8b1c1caf7c0a2fb215df79defd095e1d70eda12c2c75475a57e84225da9d666

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Deployment\88b596885c6a2aecfe43892d03c5ba6b\System.Deployment.ni.dll

                                              Filesize

                                              3.0MB

                                              MD5

                                              2ad389cde81c8ddc7056e7eba382c92d

                                              SHA1

                                              99eebd8f5e3471efd5e13555426c279eb1051a17

                                              SHA256

                                              de3a8589468a14dc7a61d19be614081d4b5000ae1604d81894f3399611e4e328

                                              SHA512

                                              692e35cf3f0c2351eca65f139975c8c621e60b9a7a88ab12f5d60517e6f3ead20a2b04b47c5f360090d05527e9435ba620776712474829110e67fae25619e7bd

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\0c073f42cf7c0b89bd4ceb4244060ceb\System.Numerics.ni.dll

                                              Filesize

                                              314KB

                                              MD5

                                              73699d2573263453632fe45cff1dc094

                                              SHA1

                                              b3df4e2af5e7520eca101c52e7145a85d29ee5df

                                              SHA256

                                              cc1326839110e27d2cbf5cf72d74e36ebe6346f65993353cf7c8ea5afd4be381

                                              SHA512

                                              489630de5b13fc1cc0ac6c93baa76b9a31da0fa48b9f53fe40d55606d3b5b344fb5bd10e549194a4187f90bb605c39b9d46ba34d93e9436862984b6688f5a71a

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Numerics\0c073f42cf7c0b89bd4ceb4244060ceb\System.Numerics.ni.dll.aux

                                              Filesize

                                              300B

                                              MD5

                                              905fbaf34d730796e231f38c60feffeb

                                              SHA1

                                              a8f995d3b27f6ea0feb485870832560025b50e4e

                                              SHA256

                                              b04b3113d61b1756e9b8087df88533276adaab7ece3d4e18cba1e956f662f21e

                                              SHA512

                                              4716d2ea8f71362bb5264a69abd252276fda352712ef89a7433c66366907a47b96ce3c50925a9036f9f378e5e67de2f94a2a74a4c99ca97930ef6b274c60f6f2

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Runt9064068c#\ab300698ff0e6328a779058c8a6abc9a\System.Runtime.Serialization.Formatters.Soap.ni.dll

                                              Filesize

                                              345KB

                                              MD5

                                              fa423347a2e17ce6ad208963bcccea75

                                              SHA1

                                              bfbe02326cbc38d16fcb7c18ae93cd5b19ef1bf4

                                              SHA256

                                              36182d6b01a0529c83f20732a1a62430d3f446bed2a8094b4a5b57423228973d

                                              SHA512

                                              3d99f29b8c16fe568d1f2771faad856446da626f7dc368944b4d315d1a6f603c900c70f44346febecc3f709871c3efa37afaf227ac10de81eb30ea0268f54cd0

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\42c7a19a453afb14fda2fe8479e4d8b2\System.Security.ni.dll

                                              Filesize

                                              986KB

                                              MD5

                                              898474cba76cf084b5d914c0f2f8f07c

                                              SHA1

                                              8a93edb2b46038c0e4b916f8d48c96abe0cfc241

                                              SHA256

                                              f2fd3ae74d836a4f971b4d8eccb109e27cd9e9f8d62ae8a4dd248828d4c936e0

                                              SHA512

                                              d1fae5172a4fed48fefc78954390ce356936a3bfb2331640355bc9c3659585b2f1aeda897a2c490586934682083522839b691b45fb2205c87c4cab926d5d5640

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\42c7a19a453afb14fda2fe8479e4d8b2\System.Security.ni.dll.aux

                                              Filesize

                                              912B

                                              MD5

                                              2919ee7ce3a32fb9281b48b99fb0b92c

                                              SHA1

                                              6aab45597d8a120a9373bac86fe3cbb19ff8e470

                                              SHA256

                                              d00cbd723a0870bc12e155e0edd51defcec623bb0c8fe0e927ea196da545e6a2

                                              SHA512

                                              b6fdbc82671af88a79e1ea6e0942a493e13a3c2527f3512079dd48b62ca704d988311ce33a944556766cea64d1b4be5460920de938c2e0ac6975e4ec55c714c1

                                            • C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Web\debe458f6197408829bf76c18c262527\System.Web.ni.dll

                                              Filesize

                                              16.2MB

                                              MD5

                                              6ec78f886589d95ea7f788af3923deb5

                                              SHA1

                                              d5247883bfc4f7bf92cc1d3e062eccf89a31f3c1

                                              SHA256

                                              4e01f30dcb3ee4cde2ba0d9cebe4958c7ed16b55d549b29559989104c2e8ebba

                                              SHA512

                                              9a5375a435f1d11903a7964fe89c31df168ab96ab1c23835705b46fe5c162aebef2df7b2594caad97868dbb97015ee1c0b6241d687034267cdd2d1fad5e7bb8c

                                            • C:\Windows\assembly\temp\4GXO9REKQ6\System.Deployment.ni.dll.aux

                                              Filesize

                                              1KB

                                              MD5

                                              218a0ba6f4d67451c5de690e2d79a50b

                                              SHA1

                                              2d88b63c563de1335f76678a7736d16ad0107f77

                                              SHA256

                                              5b3d423230067b3cd4270224ff23c0f65c4f0309525f3f0e8a9ecd4b05f633f5

                                              SHA512

                                              98043423bbfa6d92ce2b1077639a53ebbbe4af7fb24553e22f34ae68cc5b49d79df7d3ae6a6035567978787bbf467f7ebedc55ff3c8add1c3a20f19cf2f5acf3

                                            • C:\Windows\assembly\temp\HWSH3NK4XA\Microsoft.JScript.ni.dll.aux

                                              Filesize

                                              580B

                                              MD5

                                              b094143c78c988ef07a1bf541fccf4e6

                                              SHA1

                                              978ba20e486e74fba9cf306a7450240a96cc314c

                                              SHA256

                                              e6a53272d081895d24999b96ab02509ef5ac6a30a1ef901dad3f9e62252d8f80

                                              SHA512

                                              88eb0924df8c56a1e711b87f1a548b73aa18c90a197a3733c601e90793a4e74a0c771bd764e45111832196b2f81ebd90393c21053b3a93c7d85deee5eb536f5e

                                            • C:\Windows\assembly\temp\XSNK8XT9EI\System.Runtime.Serialization.Formatters.Soap.ni.dll.aux

                                              Filesize

                                              644B

                                              MD5

                                              659b7690365e7746edfe6e96c3f11d6d

                                              SHA1

                                              fdcd84bb30c5c8adeb6c9341dcba873ad3994c07

                                              SHA256

                                              95129a62658451e9a013e7f482bebbd2fd48c2925dca596ade2b5b9bcaa23309

                                              SHA512

                                              fc52c330aa042ab816e739f117e1fc0208ea8855ec6a9e19b8e3ab42b18af61794429ae85d1b8b9d902c06ae64897215e721c66674b64b31f7ca6c91034af985

                                            • memory/400-206-0x00000186F54E0000-0x00000186F5592000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/400-202-0x00000186DAE70000-0x00000186DAE7C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/400-197-0x00000186DAE60000-0x00000186DAE6C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/400-215-0x00000186F53F0000-0x00000186F540E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/400-210-0x00000186F6C10000-0x00000186F70DC000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/400-211-0x00000186F4DE0000-0x00000186F4DF2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/400-200-0x00000186F5420000-0x00000186F54D2000-memory.dmp

                                              Filesize

                                              712KB

                                            • memory/400-217-0x00000186F6870000-0x00000186F6992000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/400-169-0x00000186F4FD0000-0x00000186F5354000-memory.dmp

                                              Filesize

                                              3.5MB

                                            • memory/400-192-0x00000186F4E00000-0x00000186F4EBA000-memory.dmp

                                              Filesize

                                              744KB

                                            • memory/400-214-0x00000186F5800000-0x00000186F5844000-memory.dmp

                                              Filesize

                                              272KB

                                            • memory/400-193-0x00000186F5890000-0x00000186F5DB8000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/400-219-0x00000186F55C0000-0x00000186F55E0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/400-224-0x00000186DC6A0000-0x00000186DC6B0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/400-212-0x00000186F53D0000-0x00000186F53F0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/400-203-0x00000186F4F40000-0x00000186F4F90000-memory.dmp

                                              Filesize

                                              320KB

                                            • memory/400-213-0x00000186F55E0000-0x00000186F5612000-memory.dmp

                                              Filesize

                                              200KB

                                            • memory/400-208-0x00000186F5390000-0x00000186F53CA000-memory.dmp

                                              Filesize

                                              232KB

                                            • memory/400-216-0x00000186F55A0000-0x00000186F55BA000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/400-209-0x00000186F4D60000-0x00000186F4D7C000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/400-207-0x00000186F5360000-0x00000186F5382000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/400-195-0x00000186F4EC0000-0x00000186F4F3A000-memory.dmp

                                              Filesize

                                              488KB

                                            • memory/400-204-0x00000186F5670000-0x00000186F57F8000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/400-222-0x00000186F5620000-0x00000186F5632000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/400-218-0x00000186F6740000-0x00000186F67BE000-memory.dmp

                                              Filesize

                                              504KB

                                            • memory/400-205-0x00000186F4F90000-0x00000186F4FB2000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/400-198-0x00000186F4D90000-0x00000186F4DDA000-memory.dmp

                                              Filesize

                                              296KB

                                            • memory/400-221-0x00000186F5850000-0x00000186F588C000-memory.dmp

                                              Filesize

                                              240KB

                                            • memory/1052-605-0x0000064488000000-0x000006448802B000-memory.dmp

                                              Filesize

                                              172KB

                                            • memory/1716-329-0x0000064449A20000-0x0000064449B18000-memory.dmp

                                              Filesize

                                              992KB

                                            • memory/2020-348-0x0000064443EC0000-0x0000064443F11000-memory.dmp

                                              Filesize

                                              324KB

                                            • memory/2532-537-0x0000023C66F30000-0x0000023C66F56000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/2532-548-0x00000644C00C0000-0x00000644C10EA000-memory.dmp

                                              Filesize

                                              16.2MB

                                            • memory/2736-231-0x00000644451A0000-0x00000644454A4000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/3460-445-0x000006443CC40000-0x000006443CEF8000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/3508-399-0x0000064449980000-0x00000644499D8000-memory.dmp

                                              Filesize

                                              352KB

                                            • memory/3552-100-0x0000000000E80000-0x0000000000E88000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/3852-604-0x0000028FE96C0000-0x0000028FE96D8000-memory.dmp

                                              Filesize

                                              96KB

                                            • memory/5076-373-0x0000064445320000-0x000006444561E000-memory.dmp

                                              Filesize

                                              3.0MB