Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2025, 15:02

General

  • Target

    b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd.exe

  • Size

    1.1MB

  • MD5

    1a9f017e35766201caca66b99c8700eb

  • SHA1

    c276dd064641b832dfdf4886267526c827251467

  • SHA256

    b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd

  • SHA512

    ebe846e24f247bda738c4c6b31e1328210becc9233262ed25955e3dc627a0a251851add60db743c9eb507fb9c337fc69308e64117313f833da0e921a5f51e734

  • SSDEEP

    24576:tqv1KmEM2KM1NJL09EkhupPKRmtgAV189rYYDk4CvM:4v1KmEXKM1jGhwKstpVy9cYApvM

Malware Config

Extracted

Family

remcos

Botnet

CocoHost

C2

87.120.115.189:2404

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-Y1QVDD

  • screenshot_crypt

    false

  • screenshot_flag

    true

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    true

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd.exe
    "C:\Users\Admin\AppData\Local\Temp\b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\b58a7d4bb391ebe2243a86ea92641445e98a4da3e51abf3d2c905fb8ac0dd9dd.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4328
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\peyoVuqfV.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4412
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\peyoVuqfV" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFA2F.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:4616
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:4788
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
          PID:5000
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1368
          • \??\c:\program files (x86)\internet explorer\iexplore.exe
            "c:\program files (x86)\internet explorer\iexplore.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4912
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
              4⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:5024
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83cc446f8,0x7ff83cc44708,0x7ff83cc44718
                5⤵
                  PID:4908
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
                  5⤵
                    PID:2608
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:3
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3028
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
                    5⤵
                      PID:2176
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
                      5⤵
                        PID:3460
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:1
                        5⤵
                          PID:4056
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1844 /prefetch:1
                          5⤵
                            PID:4316
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:1
                            5⤵
                              PID:4428
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                              5⤵
                                PID:3524
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:8
                                5⤵
                                  PID:1576
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:8
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3160
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:1
                                  5⤵
                                    PID:764
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:1
                                    5⤵
                                      PID:3448
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:1
                                      5⤵
                                        PID:4108
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5816030939753967778,17235722126857629726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:1
                                        5⤵
                                          PID:3920
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
                                        4⤵
                                          PID:4440
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83cc446f8,0x7ff83cc44708,0x7ff83cc44718
                                            5⤵
                                              PID:4332
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:4372
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:3368

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          f3ccd40234aa4954a1fd506e895572bf

                                          SHA1

                                          42b4369e3c5309be4740559132a5067f192c98f5

                                          SHA256

                                          feb076d2bdbe75a3e3ee5eb655d8a726b193f51ca357a723eea1f6a603141f00

                                          SHA512

                                          624c7c1ab4dcaa22787f70c0a33bb7f375ab1d2ec635224dc4206f153ac36a199aca58524eb545d2e3ac6bbc17bd5df35c55e340453222e2610afbe417a9923f

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          15f9764a8ae046dc001850e20882d098

                                          SHA1

                                          47ca50018848c9aac650f280c7f8d511e1c57865

                                          SHA256

                                          ac953b9aa222afbbdee5d50e62024bd852caf2790e4397982687924c950203bc

                                          SHA512

                                          8d81de8018a029f52294751404235c42e3c9038d7e8cad23c84157939926915a04a20d34ee06112a479e63ead3b287ce63a563a875386f8c897f786105a908b0

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          264B

                                          MD5

                                          e1dfdb0aad1db740a00751705d25e5c4

                                          SHA1

                                          7e8494c56b4add98bfcd3f0b6071a10a2727735f

                                          SHA256

                                          5f364ef5040e7a8b24e467899f8b3cf27bb87488228c6b7c5db4e3adef61513d

                                          SHA512

                                          77a9a9ff7c9827b16a5a6f65ec06a71c10da17461e2ed4f35b35734104396f4c370a510d102126da7532ac66bb56a6e107f4cef5b5ded5abc68b3ed59bbc4a9c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          437B

                                          MD5

                                          05592d6b429a6209d372dba7629ce97c

                                          SHA1

                                          b4d45e956e3ec9651d4e1e045b887c7ccbdde326

                                          SHA256

                                          3aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd

                                          SHA512

                                          caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          5ff04b580c527a73a8e2d5fbcd75278e

                                          SHA1

                                          a1c836859f8a7f542e16ae069e56a6fb08cae5f3

                                          SHA256

                                          62a137e2dad7226adc4b94883c287e18a8543e681a6dc06b5ab526aec49a3d05

                                          SHA512

                                          c455e47a2ed341a91b62a3366b3813b13eaa304cf73a2e623f9b513698d9d51997cd1eb60e660f5a86eaf24b384c1d70b1b661f818b53477b93ac1b20c45eb8a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          34ad74e4be1d2b2d004d4ee72512008c

                                          SHA1

                                          c5f573fa0f7ba280c103409b694644789728394d

                                          SHA256

                                          4c84eb59465881cc0fb0fff13ae8af91179429a1eda157753330048150f01f9a

                                          SHA512

                                          bf829f97f2773301fd184b5c1a90992f27b974808451512bc8b76688a8177bac48ca967b3c69d1d19d2f5f5edd47bd1b87d9f6d153b92fe504089e6f3bf5fc9a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          a6fb10ea53efdfe07a1b78aaceb10933

                                          SHA1

                                          3118460f572a1160b52f14462e9aa5e791a0f552

                                          SHA256

                                          1460908b89b6bb3cde6aad6e2a753469452df862873e3b9fe1a3001cfc1f37b5

                                          SHA512

                                          9f699036a55d13217fc208a4b542690de0a0020f5244887137a6c99a5df777ab53155877c7c44e7daa3dedae972ec943ffc82222b1efa77015c7ea18b82fdf7b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                          Filesize

                                          24KB

                                          MD5

                                          167918cd653e57292b517cc03227ee17

                                          SHA1

                                          6b0300eaefd834f170e1943c2a5b7e17a0f20bfb

                                          SHA256

                                          fb814883b838d58471b44cb216779a681e0ba0f66d401cfa2e0998746595ea4e

                                          SHA512

                                          a1c00c74b29c586fdf96483c34a8be7699e655f556d5a4cf6a3c2e7a917d63b5cca9eb0b293dc89b8f243e0ff5e319e3bbf99cf96a3b4cc98070fefeaccd7beb

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                          Filesize

                                          371B

                                          MD5

                                          1be19659d1946a3387b57172fcb316ae

                                          SHA1

                                          fb61023abee6f70ff0ae6f0df7dec44a3e393b39

                                          SHA256

                                          924a73d064784747a68d6bf78be52af6310dd882ef8e7344db412bc472aab73a

                                          SHA512

                                          8e155c0af03cacf50fdf8ef52f4e6be6cb771768347b27b8d5228b129df598dd46a8696231bed9975a739bcdf712e2ceccb16f65747f92569ed85af1bb0e26c6

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58630a.TMP

                                          Filesize

                                          371B

                                          MD5

                                          090a21025544baa91888d51f638d8421

                                          SHA1

                                          a4ee70539cb3abbca139910d4000f1b9d8908ebf

                                          SHA256

                                          701a42896b860e6c3d522d33fb40dd6602fb5d9c503ab1966e95cb950d0e45ec

                                          SHA512

                                          b49da83a205c655d82c6cb21317859c09fd6d8c110ecaaabab61591127887a604d715cb3e7ac030ad0472a4996979b40b31c2ffb6b2c379c990806575803dff4

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          08b90a55fb9ded3028c867b183041d1f

                                          SHA1

                                          3e78c9b5ec75a4f26052c382a1024bddd745eef1

                                          SHA256

                                          7f29ac36350be0f98da38c52d4b9dcfdd4bdb1c8ebdff509ea50c3ef9ece6264

                                          SHA512

                                          e815fabc0b3fe78fc39422ac2c291ccf383300001796af49057bb6d4ba6e53a0e1f1acf5722e2193f54f6f5faa94f4d78d1642bb3790c0e6d79a78903c3a7d3c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          18KB

                                          MD5

                                          d566cfbcd0504b4d1a9e265aa61cb04d

                                          SHA1

                                          65b46f3d12565bc1dceffd21d8c78039daf088f6

                                          SHA256

                                          6a3441362d7ad07ca2c95e234f900094670aa3c1af8f19e5571dd09f1a6e8d8c

                                          SHA512

                                          a702d4011fb6b21dceead66b8791b7027daadbc4a9cb4e55d27b88e13e9cd323ee71d598c9fe3765c7eed0784ccb45b0ee4bce2c83e01cb4d4d235d8aa06544e

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xxdbkzn5.x1s.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Users\Admin\AppData\Local\Temp\tmpFA2F.tmp

                                          Filesize

                                          1KB

                                          MD5

                                          94ebd1a65aab0c9fae9cf40df29214fa

                                          SHA1

                                          13bb6a3a9c70ce11fd92d7e83477101204913cae

                                          SHA256

                                          e96e4a3bfff56d59b45ce7fc7d31c350f7814f32a10aa079e94ac6f322fe6931

                                          SHA512

                                          5248504cecddc25441c73131d6fd1bdede2ab9768720e988fdbb767223b8313b1b4c7229ca8cb930cf2583fd924f7abca2bd8bbbf6d25702a58da62a49832414

                                        • memory/1368-48-0x0000000000400000-0x0000000000480000-memory.dmp

                                          Filesize

                                          512KB

                                        • memory/1368-46-0x0000000000400000-0x0000000000480000-memory.dmp

                                          Filesize

                                          512KB

                                        • memory/4328-60-0x000000006F260000-0x000000006F2AC000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/4328-76-0x0000000007400000-0x0000000007A7A000-memory.dmp

                                          Filesize

                                          6.5MB

                                        • memory/4328-25-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4328-36-0x0000000005510000-0x0000000005864000-memory.dmp

                                          Filesize

                                          3.3MB

                                        • memory/4328-110-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4328-15-0x0000000002150000-0x0000000002186000-memory.dmp

                                          Filesize

                                          216KB

                                        • memory/4328-17-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4328-18-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4328-90-0x00000000070D0000-0x00000000070D8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4328-88-0x0000000006FF0000-0x0000000007004000-memory.dmp

                                          Filesize

                                          80KB

                                        • memory/4328-16-0x0000000004BC0000-0x00000000051E8000-memory.dmp

                                          Filesize

                                          6.2MB

                                        • memory/4328-82-0x0000000006FE0000-0x0000000006FEE000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/4328-79-0x0000000007030000-0x00000000070C6000-memory.dmp

                                          Filesize

                                          600KB

                                        • memory/4328-78-0x0000000006E20000-0x0000000006E2A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/4328-77-0x0000000006DB0000-0x0000000006DCA000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/4412-19-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4412-21-0x00000000058C0000-0x00000000058E2000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/4412-75-0x0000000007AA0000-0x0000000007B43000-memory.dmp

                                          Filesize

                                          652KB

                                        • memory/4412-53-0x0000000006E80000-0x0000000006EB2000-memory.dmp

                                          Filesize

                                          200KB

                                        • memory/4412-54-0x000000006F260000-0x000000006F2AC000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/4412-111-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4412-22-0x00000000061A0000-0x0000000006206000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/4412-80-0x0000000007DC0000-0x0000000007DD1000-memory.dmp

                                          Filesize

                                          68KB

                                        • memory/4412-23-0x0000000006210000-0x0000000006276000-memory.dmp

                                          Filesize

                                          408KB

                                        • memory/4412-50-0x00000000068A0000-0x00000000068BE000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/4412-41-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4412-89-0x0000000007F00000-0x0000000007F1A000-memory.dmp

                                          Filesize

                                          104KB

                                        • memory/4412-52-0x0000000006DD0000-0x0000000006E1C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/4412-74-0x0000000006E60000-0x0000000006E7E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/4412-24-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4880-7-0x0000000007750000-0x000000000776E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/4880-10-0x000000000A280000-0x000000000A344000-memory.dmp

                                          Filesize

                                          784KB

                                        • memory/4880-51-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4880-0-0x00000000747DE000-0x00000000747DF000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4880-9-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4880-8-0x00000000747DE000-0x00000000747DF000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4880-6-0x00000000747D0000-0x0000000074F80000-memory.dmp

                                          Filesize

                                          7.7MB

                                        • memory/4880-5-0x0000000004F60000-0x0000000004FFC000-memory.dmp

                                          Filesize

                                          624KB

                                        • memory/4880-4-0x0000000004E00000-0x0000000004E0A000-memory.dmp

                                          Filesize

                                          40KB

                                        • memory/4880-3-0x0000000004C50000-0x0000000004CE2000-memory.dmp

                                          Filesize

                                          584KB

                                        • memory/4880-2-0x0000000005160000-0x0000000005704000-memory.dmp

                                          Filesize

                                          5.6MB

                                        • memory/4880-1-0x0000000000280000-0x000000000039E000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/4912-49-0x0000000001170000-0x00000000011B0000-memory.dmp

                                          Filesize

                                          256KB