Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 12:38

General

  • Target

    49b35e.msi

  • Size

    4.7MB

  • MD5

    ecdd7739e76adee32b9cd61f4a132963

  • SHA1

    14e5ec6b9c6bdaab641009284e2f41067462bf21

  • SHA256

    59baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16

  • SHA512

    91526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229

  • SSDEEP

    98304:5Yqd1ASubUZwPEDYPo6sAPGJ60TGEtof1SvfRL8YwlYfRa6:LHr0PdsAPGJVTGEOdSvfSUa

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Uses browser remote debugging 2 TTPs 10 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks for any installed AV software in registry 1 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3580
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\49b35e.msi
        2⤵
        • Enumerates connected drives
        • Event Triggered Execution: Installer Packages
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:5660
      • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
        "C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5096
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=8270 --profile-directory="Default"
          3⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1476
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb2899dcf8,0x7ffb2899dd04,0x7ffb2899dd10
            4⤵
              PID:4448
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2012,i,13473168371165235774,4871702046205366042,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2008 /prefetch:2
              4⤵
                PID:2768
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1588,i,13473168371165235774,4871702046205366042,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2272 /prefetch:3
                4⤵
                  PID:5092
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2388,i,13473168371165235774,4871702046205366042,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2556 /prefetch:8
                  4⤵
                    PID:5356
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=8270 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3240,i,13473168371165235774,4871702046205366042,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3304 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:864
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=8270 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,13473168371165235774,4871702046205366042,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3324 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:4956
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=8270 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,13473168371165235774,4871702046205366042,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4576 /prefetch:2
                    4⤵
                    • Uses browser remote debugging
                    PID:5424
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=8270 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4532,i,13473168371165235774,4871702046205366042,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4600 /prefetch:2
                    4⤵
                    • Uses browser remote debugging
                    PID:312
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=8270 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4832,i,13473168371165235774,4871702046205366042,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4864 /prefetch:1
                    4⤵
                    • Uses browser remote debugging
                    PID:5984
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=7981 --profile-directory="Default"
                  3⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  PID:1828
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x26c,0x7ffb19aff208,0x7ffb19aff214,0x7ffb19aff220
                    4⤵
                      PID:320
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1960,i,11930990480782943395,959597033486323405,262144 --variations-seed-version --mojo-platform-channel-handle=2388 /prefetch:3
                      4⤵
                        PID:6136
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2196,i,11930990480782943395,959597033486323405,262144 --variations-seed-version --mojo-platform-channel-handle=2244 /prefetch:2
                        4⤵
                          PID:3212
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1972,i,11930990480782943395,959597033486323405,262144 --variations-seed-version --mojo-platform-channel-handle=2724 /prefetch:8
                          4⤵
                            PID:4336
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=7981 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3604,i,11930990480782943395,959597033486323405,262144 --variations-seed-version --mojo-platform-channel-handle=3688 /prefetch:1
                            4⤵
                            • Uses browser remote debugging
                            PID:3828
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=7981 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3612,i,11930990480782943395,959597033486323405,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:1
                            4⤵
                            • Uses browser remote debugging
                            PID:3888
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --pdf-upsell-enabled --remote-debugging-port=7981 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4996,i,11930990480782943395,959597033486323405,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:2
                            4⤵
                            • Uses browser remote debugging
                            PID:5228
                    • C:\Windows\system32\msiexec.exe
                      C:\Windows\system32\msiexec.exe /V
                      1⤵
                      • Enumerates connected drives
                      • Drops file in Windows directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:5180
                      • C:\Windows\system32\srtasks.exe
                        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4180
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 162F53CB0873461D884B28F7C04357FB
                        2⤵
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:4084
                      • C:\Users\Admin\AppData\Local\Kart\GmRemote.exe
                        "C:\Users\Admin\AppData\Local\Kart\GmRemote.exe"
                        2⤵
                        • Checks for any installed AV software in registry
                        • Suspicious use of SetThreadContext
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:2968
                        • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
                          C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe
                          3⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Suspicious use of SetThreadContext
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:5940
                        • C:\Windows\SysWOW64\gpupdate.exe
                          C:\Windows\SysWOW64\gpupdate.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3504
                    • C:\Windows\system32\vssvc.exe
                      C:\Windows\system32\vssvc.exe
                      1⤵
                      • Checks SCSI registry key(s)
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5540
                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                      1⤵
                        PID:6012
                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                        1⤵
                          PID:3744

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Config.Msi\e579463.rbs

                          Filesize

                          11KB

                          MD5

                          ca2016f2ab9153060107c89ff66f56e8

                          SHA1

                          39cbd872c014a875b38eb0c39bd8a9ce66b4fb56

                          SHA256

                          9f58b82073c509cc9e5d2c65bd7b9fc3add03744911bed61bf5c81a557c0efa3

                          SHA512

                          6ba6aa3fc92491f3459cf1f8a6a85ed69c83a3ee2f3596fc0f0a528a148969a5d71e829cee09af5e0c04592c5b482f5afc8835a56b271195aede34e755b41ca5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          17KB

                          MD5

                          b78f388d08dce319ad56281c037045b1

                          SHA1

                          b7b42e1d068d92357b51334935002caaa3982825

                          SHA256

                          5b0600f84a284472f6ec28d472d64cbf7a4cfe0a696b0f2b7b7220a815216f2d

                          SHA512

                          35791e42b5c6a6b4fd821955e54f050c20362497c89f9931fc20ae36fa332ee4a83885afea614a4111f1f5eb4706d663c0a8c165c4eaaa4de372a58072b5ddaa

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          79KB

                          MD5

                          a2cd5a10c997c90527e724a21b0e4d36

                          SHA1

                          ada31fa62b4cba479d5e60178cba6979690102f5

                          SHA256

                          1b6b28f59d50b6d4c0671b1002a566f743d13a497a3cfafc7df1a91cd061a6c5

                          SHA512

                          507a95a46ff13f5ad4aef0b5b75b903bd0602e6b176134e947bd266d91b0872125c5dc21738ee9a089a1bb7497955beda48fa25c47b17d6157880c15a7d410b9

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          280B

                          MD5

                          7b0736a36bad51260e5db322736df2e9

                          SHA1

                          30af14ed09d3f769230d67f51e0adb955833673e

                          SHA256

                          0d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087

                          SHA512

                          caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                          Filesize

                          33KB

                          MD5

                          4f1f7deec9d87396ab7f4cf51d1952d8

                          SHA1

                          bd90a0535f97ff6b01cd30e95c8bf01e17d6aebe

                          SHA256

                          15b8b06e5cb7962c7f5328f9dd778bf392f843fb039e47bb0be3a5083e5b3bca

                          SHA512

                          9f7c41a26759eebc91838d9e67b6cbe0390ebaddf43be45e1573b5810102da88fb4bdc8f5681bf688f570c2b3bcbbd4fbaf8274e19d33f915831b22807f61bb3

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index

                          Filesize

                          1KB

                          MD5

                          adeb21f8f1b7f09aa7320ec8f4f95e9e

                          SHA1

                          729a0eefc5f37a71ba9d8e02e8ac5f5ccbaeebac

                          SHA256

                          a7e2a7a3e5174a65e097a198e99667aa573323fc6aad391ab87197da23ec14eb

                          SHA512

                          a25b5cad6601b551925bb351dd05d3d32ec720ce5c227008ffc4011978dc482127cb2dfa071a8c18c9339654a9e911bab1af05bbdd5fe83101a4ab1f03dfa048

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index~RFe587c6e.TMP

                          Filesize

                          1KB

                          MD5

                          bc003a7c6aeb084b9c11a5c2e8c17a6e

                          SHA1

                          39d3e503a46ca33c12bfeed71027bf8a7542e7d2

                          SHA256

                          c953ebf1f1e028192ba40fe1d112e1f50b15ac676d95cd13d10e57bc9bf1b659

                          SHA512

                          9b1b12e9b48da653f9fe8560a90ad863c28325100e1f4730b587044d44864b54b657320f90acba22521de2025b2b3b91ea10a18b67c8459304faf217b779993a

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          40KB

                          MD5

                          291509583074785565ef81b8eca597d2

                          SHA1

                          42d128f75f9f637cb297aaa1007ef0e2f23fda86

                          SHA256

                          907bc1e365a4dfb530fddffbf976c3d969b1b2947a71e1e89c46f6165f46e7dd

                          SHA512

                          8a3d08e61f54272c65ef47751e4919c50f9b1c7b660b2b3326bb1bb2a69627eafe60e0babef534f809632712e2c662f0ff4971eb85993a0661e571f1fbe37dd1

                        • C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe

                          Filesize

                          99KB

                          MD5

                          f61fa5ce25f885a9b1f549055c9911ed

                          SHA1

                          aba1c035b06017b0b0bd1c712669646e4f3765ab

                          SHA256

                          57e9675902b443085e37ead57dfed97de6bb61321682bc93aff30f16b5ca5aeb

                          SHA512

                          02e3db343037294fd3b774f954c9a617a50715e6b89d7c409f3c7dc5a1cf5ed9418158c442e9e80111994da139a9a16db33ac68a833d6d115c4a41bdf75751ac

                        • C:\Users\Admin\AppData\Local\Temp\3dacb276

                          Filesize

                          2.8MB

                          MD5

                          9f2b0e4d218442927581577f52997f8d

                          SHA1

                          ab74e08d3a230260a545036c4ab423db1e4746e8

                          SHA256

                          47d20fa8d26cd6659bdcd45bce3a2666706d1e0b52b69ee023b58ac7e61bd936

                          SHA512

                          4f7db2f85793056884876be3506710833c2bed20b0fb0d13db0e347f28b4935fa20b1d5968b63f9877ea473aed6c8bf28dc91af0cacaeee43d63f31a87e44e8b

                        • C:\Users\Admin\AppData\Local\Temp\40b69474

                          Filesize

                          2.7MB

                          MD5

                          ac8782983424aa539bbe94fbb1fcfbd0

                          SHA1

                          c15276a5ac564dd9872504f60a95850bcc00a5ff

                          SHA256

                          fa6f44a4ee3eba367e66f54141e00c860f741c0e5655eb63ae59454b203d98e7

                          SHA512

                          44300a82af4f139b9710d08b345a693dfd3a5fd17c61d969269caffe6d21abce2b48c8b11b9689205ff0d572495dbe308f7401ee1176435657c20375d69e68ba

                        • C:\Users\Admin\AppData\Local\Temp\40b69474

                          Filesize

                          2.7MB

                          MD5

                          a8ea3a2fc14f8b273bc1935d43da1984

                          SHA1

                          efe374596b618ef9d370aba05b42d9a0ac65dac1

                          SHA256

                          c660d5677189669d513c0b56be46faa85d3b703601bedf01c56b955fcedacd29

                          SHA512

                          d9d13bd1ebb1c6fe156ea375103476bce8f2bf7bfca4a8b57983eb0cb7b6c711ec5ac4a8c8f98d033025b4fa0e0038178a259524d312f453534ffaeca9b5cb17

                        • C:\Users\Admin\AppData\Local\nimdA\llg\background.js

                          Filesize

                          596B

                          MD5

                          aa0e77ec6b92f58452bb5577b9980e6f

                          SHA1

                          237872f2b0c90e8cbe61eaa0e2919d6578cacd3f

                          SHA256

                          aad1c9be17f64d7700feb2d38df7dc7446a48bf001ae42095b59b11fd24dfcde

                          SHA512

                          37366bd1e0a59036fe966f2e2fe3a0f7dce6f11f2ed5bf7724afb61ea5e8d3e01bdc514f0deb3beb6febfd8b4d08d45e4e729c23cc8f4cae4f6d11f18fc39fa6

                        • C:\Users\Admin\AppData\Local\nimdA\llg\content.js

                          Filesize

                          1KB

                          MD5

                          cfbf46fdac2d3380e858db9c434a2e8d

                          SHA1

                          de2b6f97e2506f048141270f8499008ed1715204

                          SHA256

                          1d74732b4c8db898c02733ce77e49accbb6948768368ab5fdb6261e3728f9342

                          SHA512

                          37bed8fbfaee4deb287284c7d0b88b0cd159a65ef96dd230ca0d0d39c3e04d49f2f44fc2fe6ed4af8eade72a3555f18cea6bacd694c33a6317bc5ad88a4e4e30

                        • C:\Users\Admin\AppData\Local\nimdA\llg\icon.png

                          Filesize

                          5KB

                          MD5

                          2c905a6e4a21a3fa14adc1d99b7cbc03

                          SHA1

                          bd8682b580d951e3df05dfd467abba6b87bb43d9

                          SHA256

                          cc3631ced23f21ae095c1397770e685f12f6ad788c8fa2f15487835a77a380fb

                          SHA512

                          753e28bab9d50b7882a1308f6072f80fda99edeaa476fafc7e647d29f5c9c15f5c404689c866f8f198b7f1ed41bae3cc55ae4d15528b0df966a47cbc4b31caf6

                        • C:\Users\Admin\AppData\Local\nimdA\llg\jquery.js

                          Filesize

                          93KB

                          MD5

                          3c9137d88a00b1ae0b41ff6a70571615

                          SHA1

                          1797d73e9da4287351f6fbec1b183c19be217c2a

                          SHA256

                          24262baafef17092927c3dafe764aaa52a2a371b83ed2249cca7e414df99fac1

                          SHA512

                          31730738e73937ee0086849cb3d6506ea383ca2eac312b8d08e25c60563df5702fc2b92b3778c4b2b66e7fddd6965d74b5a4df5132df3f02faed01dcf3c7bcae

                        • C:\Users\Admin\AppData\Local\nimdA\llg\manifest.json

                          Filesize

                          569B

                          MD5

                          2835dd0a0aef8405d47ab7f73d82eaa5

                          SHA1

                          851ea2b4f89fc06f6a4cd458840dd5c660a3b76c

                          SHA256

                          2aafd1356d876255a99905fbcafb516de31952e079923b9ddf33560bbe5ed2f3

                          SHA512

                          490327e218b0c01239ac419e02a4dc2bd121a08cb7734f8e2ba22e869b60175d599104ba4b45ef580e84e312fe241b3d565fac958b874d6256473c2f987108cc

                        • C:\Windows\Installer\MSI94AE.tmp

                          Filesize

                          386KB

                          MD5

                          72b1c6699ddc2baab105d32761285df2

                          SHA1

                          fc85e9fb190f205e6752624a5231515c4ee4e155

                          SHA256

                          bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97

                          SHA512

                          cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170

                        • C:\Windows\Installer\e579460.msi

                          Filesize

                          4.7MB

                          MD5

                          ecdd7739e76adee32b9cd61f4a132963

                          SHA1

                          14e5ec6b9c6bdaab641009284e2f41067462bf21

                          SHA256

                          59baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16

                          SHA512

                          91526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229

                        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                          Filesize

                          24.1MB

                          MD5

                          a480e7fa5f352bced4886df6caec9f94

                          SHA1

                          9e998854ce9dc1fb783cf70111d4d5a23a6a6ce4

                          SHA256

                          ae89281b5fa8a1848db164107213ee224f957b290891ae88de0619c416b90a62

                          SHA512

                          853a83cd1a34681aac3c32a1417a4604ff87427d08c464841fbc75ff33917c4375830b2b7fb3092cbf4e6d5f2360a026c5f2cb51ea66949c3abb07c7d5e1991b

                        • \??\Volume{a6f17796-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{48e55ba0-aa07-4c9b-8afb-eb9616ed4b61}_OnDiskSnapshotProp

                          Filesize

                          6KB

                          MD5

                          410af0a00fe2083eba65ece5b5c524eb

                          SHA1

                          0f19eba609227e82a619e72e508ef3a269675c08

                          SHA256

                          61732e95a58d0bc6b000df863d9cdfd3e9da91e8a67fc1e9a546dd829505132f

                          SHA512

                          9554de44b5074809537f016d6c92d4ac775e29298ebdb53d30605146ac196fbdd32ae889b88a72bbc17ff10d946cfc120495a509b12b60e0b49272d3674fcf9a

                        • memory/2968-56-0x0000000074B30000-0x0000000074B7F000-memory.dmp

                          Filesize

                          316KB

                        • memory/2968-44-0x0000000000210000-0x0000000000689000-memory.dmp

                          Filesize

                          4.5MB

                        • memory/2968-52-0x00007FFB4A150000-0x00007FFB4A345000-memory.dmp

                          Filesize

                          2.0MB

                        • memory/2968-51-0x0000000074B30000-0x0000000074B7F000-memory.dmp

                          Filesize

                          316KB

                        • memory/5096-1438-0x0000000005590000-0x00000000055CC000-memory.dmp

                          Filesize

                          240KB

                        • memory/5096-1437-0x0000000005310000-0x0000000005322000-memory.dmp

                          Filesize

                          72KB

                        • memory/5096-1429-0x0000000007C10000-0x0000000007C1A000-memory.dmp

                          Filesize

                          40KB

                        • memory/5096-1414-0x0000000000400000-0x00000000004D4000-memory.dmp

                          Filesize

                          848KB

                        • memory/5096-1422-0x0000000005E00000-0x0000000005E66000-memory.dmp

                          Filesize

                          408KB

                        • memory/5096-1421-0x0000000005D30000-0x0000000005D4E000-memory.dmp

                          Filesize

                          120KB

                        • memory/5096-1420-0x0000000006240000-0x000000000676C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/5096-1419-0x00000000056D0000-0x0000000005746000-memory.dmp

                          Filesize

                          472KB

                        • memory/5096-1416-0x0000000005380000-0x0000000005542000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/5096-1415-0x0000000005060000-0x00000000050B0000-memory.dmp

                          Filesize

                          320KB

                        • memory/5940-112-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-94-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-72-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-71-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-68-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-96-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-87-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-80-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-66-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-65-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-1403-0x0000000006410000-0x00000000064D8000-memory.dmp

                          Filesize

                          800KB

                        • memory/5940-1404-0x0000000006630000-0x00000000066F6000-memory.dmp

                          Filesize

                          792KB

                        • memory/5940-1405-0x0000000006340000-0x000000000638C000-memory.dmp

                          Filesize

                          304KB

                        • memory/5940-1406-0x0000000006FF0000-0x0000000007044000-memory.dmp

                          Filesize

                          336KB

                        • memory/5940-82-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-84-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-88-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-90-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-92-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-74-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-98-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-100-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-102-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-118-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-104-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-106-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-108-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-114-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-116-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-120-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-122-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-110-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-78-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-76-0x0000000006050000-0x00000000061BB000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-64-0x00000000062A0000-0x0000000006332000-memory.dmp

                          Filesize

                          584KB

                        • memory/5940-63-0x0000000006770000-0x0000000006D14000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/5940-62-0x0000000006050000-0x00000000061C0000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5940-61-0x0000000005980000-0x0000000005B1C000-memory.dmp

                          Filesize

                          1.6MB

                        • memory/5940-57-0x00000000746A0000-0x0000000074931000-memory.dmp

                          Filesize

                          2.6MB