Analysis

  • max time kernel
    163s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2025, 16:35

Errors

Reason
Machine shutdown

General

  • Target

    https://github.com/ShadowWhisperer/Remove-MS-Edge/blob/main/Remove-Edge.exe?raw=true

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 28 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 56 IoCs
  • Modifies registry key 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/ShadowWhisperer/Remove-MS-Edge/blob/main/Remove-Edge.exe?raw=true
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5984
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa9777dcf8,0x7ffa9777dd04,0x7ffa9777dd10
      2⤵
        PID:3640
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2148,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:1476
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1548,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2176 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          PID:1444
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2352,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2504 /prefetch:8
          2⤵
            PID:552
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3208 /prefetch:1
            2⤵
              PID:5208
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3236 /prefetch:1
              2⤵
                PID:5664
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4396,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4432 /prefetch:2
                2⤵
                  PID:720
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5556,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5568 /prefetch:8
                  2⤵
                    PID:5076
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5404,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5564 /prefetch:8
                    2⤵
                      PID:4532
                    • C:\Users\Admin\Downloads\Remove-Edge.exe
                      "C:\Users\Admin\Downloads\Remove-Edge.exe"
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:1632
                      • C:\Users\Admin\Downloads\Remove-Edge.exe
                        "C:\Users\Admin\Downloads\Remove-Edge.exe"
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:1768
                        • C:\Users\Admin\AppData\Local\Temp\_MEI16322\setup.exe
                          C:\Users\Admin\AppData\Local\Temp\_MEI16322\setup.exe --uninstall --system-level --force-uninstall
                          4⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Installs/modifies Browser Helper Object
                          • Modifies Internet Explorer settings
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:6000
                          • C:\Users\Admin\AppData\Local\Temp\_MEI16322\setup.exe
                            C:\Users\Admin\AppData\Local\Temp\_MEI16322\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 --annotation=exe=C:\Users\Admin\AppData\Local\Temp\_MEI16322\setup.exe --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x128,0x224,0x22c,0xa0,0x230,0x7ff745a6eb10,0x7ff745a6eb20,0x7ff745a6eb30
                            5⤵
                            • Executes dropped EXE
                            PID:4476
                          • C:\Windows\system32\wermgr.exe
                            "C:\Windows\system32\wermgr.exe" "-outproc" "0" "6000" "1744" "1596" "1748" "0" "0" "0" "0" "0" "0" "0" "0"
                            5⤵
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            PID:2456
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c timeout /t 2 >nul
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:872
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 2
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Delays execution with timeout.exe
                            PID:228
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "(New-Object System.Security.Principal.NTAccount($env:USERNAME)).Translate([System.Security.Principal.SecurityIdentifier]).Value"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:6100
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -NoProfile -Command "Get-AppxPackage -AllUsers | Where-Object {$_.PackageFullName -like \"*microsoftedge*\"} | Select-Object -ExpandProperty PackageFullName"
                          4⤵
                          • Command and Scripting Interpreter: PowerShell
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5356
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -Command "Remove-AppxPackage -Package Microsoft.MicrosoftEdge_44.19041.1266.0_neutral__8wekyb3d8bbwe 2>$null"
                          4⤵
                          • Command and Scripting Interpreter: PowerShell
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3892
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -Command "Remove-AppxPackage -Package Microsoft.MicrosoftEdge_44.19041.1266.0_neutral__8wekyb3d8bbwe -AllUsers 2>$null"
                          4⤵
                          • Command and Scripting Interpreter: PowerShell
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1784
                        • C:\Windows\SysWOW64\reg.exe
                          reg delete "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}" /f
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3976
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /query /fo csv
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3488
                        • C:\Windows\SysWOW64\sc.exe
                          sc delete edgeupdate
                          4⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:748
                        • C:\Windows\SysWOW64\reg.exe
                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\edgeupdate /f
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies registry key
                          PID:5252
                        • C:\Windows\SysWOW64\reg.exe
                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\edgeupdatem /f
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies registry key
                          PID:2240
                        • C:\Windows\SysWOW64\sc.exe
                          sc delete edgeupdatem
                          4⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:5172
                        • C:\Windows\SysWOW64\reg.exe
                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\edgeupdate /f
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies registry key
                          PID:1356
                        • C:\Windows\SysWOW64\reg.exe
                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\edgeupdatem /f
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies registry key
                          PID:3180
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c "takeown /f "C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe" /r /d y && icacls "C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe" /grant administrators:F /t && rd /s /q "C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe""
                          4⤵
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:5472
                          • C:\Windows\SysWOW64\takeown.exe
                            takeown /f "C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe" /r /d y
                            5⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5284
                          • C:\Windows\SysWOW64\icacls.exe
                            icacls "C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe" /grant administrators:F /t
                            5⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            • System Location Discovery: System Language Discovery
                            PID:1968
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c "takeown /f "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe" /r /d y && icacls "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe" /grant administrators:F /t && rd /s /q "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe""
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:5128
                          • C:\Windows\SysWOW64\takeown.exe
                            takeown /f "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe" /r /d y
                            5⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5132
                          • C:\Windows\SysWOW64\icacls.exe
                            icacls "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe" /grant administrators:F /t
                            5⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            • System Location Discovery: System Language Discovery
                            PID:5240
                        • C:\Windows\SysWOW64\reg.exe
                          reg delete HKLM\SOFTWARE\WOW6432Node\Microsoft\Edge /f
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies registry key
                          PID:5020
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /IM MicrosoftEdgeUpdate.exe /F
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1260
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c "rmdir /q /s "C:\Program Files (x86)\Microsoft\Edge""
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:2552
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c "rmdir /q /s "C:\Program Files (x86)\Microsoft\EdgeCore""
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4628
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c "rmdir /q /s "C:\Program Files (x86)\Microsoft\EdgeUpdate""
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:5796
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c "rmdir /q /s "C:\Program Files (x86)\Microsoft\Temp""
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4868
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5788,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5896 /prefetch:8
                      2⤵
                        PID:5784
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5808,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5980 /prefetch:8
                        2⤵
                          PID:5640
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5992,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6068 /prefetch:8
                          2⤵
                            PID:228
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=6096,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6084 /prefetch:1
                            2⤵
                              PID:4256
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=6200,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6180 /prefetch:1
                              2⤵
                                PID:3856
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4460,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4476 /prefetch:1
                                2⤵
                                  PID:1088
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=6400,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6076 /prefetch:1
                                  2⤵
                                    PID:748
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3360,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3228 /prefetch:1
                                    2⤵
                                      PID:3980
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3660,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4932 /prefetch:1
                                      2⤵
                                        PID:1008
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=6108,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=732 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1156
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=6452,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6192 /prefetch:1
                                        2⤵
                                          PID:4908
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6496,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6588 /prefetch:1
                                          2⤵
                                            PID:2440
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6464,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6076 /prefetch:1
                                            2⤵
                                              PID:4172
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=3868,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6720 /prefetch:1
                                              2⤵
                                                PID:4876
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6864,i,7756931522881231128,15064725402895090395,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6896 /prefetch:8
                                                2⤵
                                                  PID:4192
                                              • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                1⤵
                                                  PID:2552
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                  1⤵
                                                    PID:4216
                                                  • C:\Windows\system32\rundll32.exe
                                                    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe
                                                    1⤵
                                                      PID:5496
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                                      1⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2580
                                                    • C:\Windows\system32\AUDIODG.EXE
                                                      C:\Windows\system32\AUDIODG.EXE 0x384 0x49c
                                                      1⤵
                                                        PID:3932
                                                      • C:\Windows\system32\LogonUI.exe
                                                        "LogonUI.exe" /flags:0x4 /state0:0xa3883055 /state1:0x41c64e6d
                                                        1⤵
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:5584

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                        Filesize

                                                        649B

                                                        MD5

                                                        13de1af7f8da885e45de6d5b635a3550

                                                        SHA1

                                                        d9ead5a71f65487adddbe6cb0141db019c414f79

                                                        SHA256

                                                        a96c0a0ae33b9a65add9b8b500ab2e2a3d8544e4ffeb026a70ef35a8aca4d5c0

                                                        SHA512

                                                        9009eda06372a061b77f0a9df0033509bb3519e7f3c027af0ed221e36c4917eecab272692a80a1516231a6e33e65ffbcd3feac4566a100745ddbb886147db7d4

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000020

                                                        Filesize

                                                        76KB

                                                        MD5

                                                        dc87136fded16ec9e5c5057eee11dc4c

                                                        SHA1

                                                        c937e8454e22db9bd633aca5f184485af14af356

                                                        SHA256

                                                        bb3d85640f88d4bafc8c1d91b5c63f2d275a25e5004c8e0bcf823f5691fb8c62

                                                        SHA512

                                                        6bdd19527798c92f37a12358b113d7c91e6cce847d6ea9b89b86e80627ac5fc4ae0a45e1eef7e280aa90917dd47cea846ff60b80440bcd49a9e7840f3e788dbd

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000024

                                                        Filesize

                                                        77KB

                                                        MD5

                                                        24508ef27c1542e82513ff5ffb24e10c

                                                        SHA1

                                                        836ef595638e7dbbacc0e61a2d88060a67a5159c

                                                        SHA256

                                                        5c0ebd969e8b9787bb7b9390bca3618ff38cdabc4e26a0ba626b1293d89efad6

                                                        SHA512

                                                        5a59b7264293ad093dfaeb78c462dd3dc3ebf3d4ffad7829eabce2d89ba645e2164d04df44263d94ca029110c7df62e17af99bf414c3f9d68547912dbe79dfb4

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        edf7b2b75834a99137f71fdce9cd6b9d

                                                        SHA1

                                                        a2e54b7a469eb5ae5300b6586fe085e1401060ac

                                                        SHA256

                                                        a5fb5b7b6a1bc37afca7afd1144c93896beb5d2a115d5e2358a74699fa9844f2

                                                        SHA512

                                                        29d064e2842738fad2035591f6c98e9b4749ddd40c613c1ab0c9a0870c8bb4e42cb6d0e62ea8abbe1c0385eb0beb37f52415e9a0ba3ff33b7fe8266b6a1c05ad

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnGraphiteCache\data_1

                                                        Filesize

                                                        264KB

                                                        MD5

                                                        4be404cbda90e31583ec3d57669060b2

                                                        SHA1

                                                        f0fee2fa4e6ee48d623eaaabad1cb76228de1520

                                                        SHA256

                                                        c1049c8634ceb3cbea74e45e0294bbab9b3f20ddcc1ded6bb259afcb161bc4ce

                                                        SHA512

                                                        8bc661427dc9f0965f208b1b39db4070e32277e8a7757479a3dbfccaddf5f2f6ae30fc97ef042b97a4406c17ebe0df740305e0df9c0072e2d6c3eef22e48e6f0

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        8b3ea993017de94640be4f7131933614

                                                        SHA1

                                                        79cf793530ea19efb571f64debbf49039852e52c

                                                        SHA256

                                                        4f476fc0aa94597b0e5be95d83b271812eddbeea7452fc968e5ad81b120ac77a

                                                        SHA512

                                                        c503f7796d3eb934ec19f6e0ec9a3e94db6c9cfa97942319754eaf9e2629d4933adff949c4b27d9943aaca8b3ee51b5d06c3d09570abe11d423898f196a83b4c

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        8KB

                                                        MD5

                                                        7989c95bd553d04103a4d3f7bee28297

                                                        SHA1

                                                        4aa3c7d754c6ec82478ccea638655e3152214a47

                                                        SHA256

                                                        fa14b2844aff7c6a808037abd4e7d707b658ff4cdd86b2c177f43f9fd20eee99

                                                        SHA512

                                                        b4edde325022e66c09dbd69d2cf4dbb8eabb487b8fe8fce26d2e53807bdf568f1bb3b65db23705b3f160f19ae3895702c0eca8d8c2851973ebdf7b189c53f1e3

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        116272b64e759986a64721e366b692f2

                                                        SHA1

                                                        5f05cb48de747502575042771220279082871912

                                                        SHA256

                                                        ed93e631930e21cf87d3ddf7aa9dbbc84a6a3d5daa67b104d84f8035525267c9

                                                        SHA512

                                                        038f486030f06d352c60f56f47cd4920dcb31915d9244495b34f8b776dca79eebc1fe38d68e83dc17253972cd9c5dc876860e6a31ba2cfecadb59ff1a301c606

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        dcdf7f4914985b535fe3f01c2f5e3a2b

                                                        SHA1

                                                        67faad346dbcd4c2e2414b6584d76e1be207ce74

                                                        SHA256

                                                        82c8acf30c2b865858eaf170e91fbbb606faaa95ae54cbbfaea46764b65b1d66

                                                        SHA512

                                                        16ce84ad3b2a5c632648d31c35a480ed78daf581e3dc81cd3dc6b761438bfb366e52e3d73074614daadf775fc7a1f7860ff26cd23c7594b7b40824da752e0c92

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        20571aadd5b726805a939ee2baf2203f

                                                        SHA1

                                                        0624dca8b8777e8d897e989947ea3d8a3bf3780a

                                                        SHA256

                                                        be0782ec035bb661eb101a2c25758ea91dde3ecd4657094725c6f3b853113552

                                                        SHA512

                                                        781e442cc52c84cb75c343996946a0741b98c04c2e654f55ae3613ce87a8ce16c94fd593cd75d61a5be770f5d007d46a48bc18b4d3950e625c013d70ebb518d1

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                        Filesize

                                                        2B

                                                        MD5

                                                        d751713988987e9331980363e24189ce

                                                        SHA1

                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                        SHA256

                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                        SHA512

                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        2edf58115f563909cc36d1f72b0aa25f

                                                        SHA1

                                                        142b3898f83187a039d1e9d0b4ae2fec1312a914

                                                        SHA256

                                                        b9fcfcbfbf89dbb28e0f52f0a4e373d520c051f43f1b612525159f1df9a5bdc5

                                                        SHA512

                                                        dc5635a3867993e33cf8fcfc760a6cd72f9259d828ae58fbdfca01dcc336f585174e749a6ea4780efd0c95b913e585d2b4b3d28503e85d2678c9de165eee0c6a

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        912c517357f4b296dd1fbb8bc874322a

                                                        SHA1

                                                        11aca5c6056274e7370dcadf3809c5de98669ec7

                                                        SHA256

                                                        5bc86a6a24f6b48dcb2cdb213ff349d4aedcb82ae7ddcd568cf333cf438f8e03

                                                        SHA512

                                                        96ba2ef431be45f66d9f58e45533f78a9919ecc9639cf31ea9440edc45653eb4ea32ed675ddab8e196aa1a384bfd8636142e3ad841b9698472967101f810dc83

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        91ae7f8842f980aea8e8c77753eabe4f

                                                        SHA1

                                                        d2c452f774ec91c5188a3816a11c5d03652ec8ba

                                                        SHA256

                                                        e2869206cb4389000407373ca3570f558b28d2adb7bdd97a2db924a86183d119

                                                        SHA512

                                                        e1a0f4c8ec1d0d670ba8f829f7b19b8462b5499aa8d3dc979e1e7e03d2e846c38a3e7f21e66fd1ad38cbe0c5d64f83af91cd381ded3a51e93a6d049daa23cbf4

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        0a24813ad552cedc4d628cc26e53a6d7

                                                        SHA1

                                                        b94e809af929fecede640abaa370ae859ea0630f

                                                        SHA256

                                                        367625908007db341d876368d062a8c6a0f704bc4816897dd7970c0b0f5f13b8

                                                        SHA512

                                                        da74386f1583d6b0db2f3638a816dabb5a84e8a543ea2fc5cfb948ebdac0841cc52f2b826fafa066ec7940f0130630273711173bea934cd22e35cc076d2951f3

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        78aca0fa745fba99fe7279f0cba3ca1d

                                                        SHA1

                                                        25842b83b18e6b2d10fecb5b230efacf3fc708e7

                                                        SHA256

                                                        ad17e6f2904f072e289f38493253d84cf483062a321b616712c4578908ea0c7b

                                                        SHA512

                                                        fa4a3676b3d7de9bd83671a790077a8ed68f06495db94b1ee98a66b4704ff13193d27ee5c7f9da328767aec2621b548be3d901f4027e8d4a84f1bcec10d63047

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        4f23b59aad35b6a7fa267d0dd7a273bf

                                                        SHA1

                                                        24130545d07b55d1b2afa0b5f2e093490b4d5a21

                                                        SHA256

                                                        ccc6948b7517bf5cc7d3b80dbb2a1109c47198427f4a810f30a690fc427ed4ed

                                                        SHA512

                                                        a531cd994d83217fbef3791275a233c67a049e40c24ecfd11c4ed7f1f83026bcfa192d98d794caa89febe1959bb6fa068e6339f6b0077046c3ebc96cc8e9ea67

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        383fd026e0cc6dd3ba116c2aabd911b6

                                                        SHA1

                                                        26d79dd7ed7ad07cf25796b4b1f526294d21d852

                                                        SHA256

                                                        a6bd53e6e6724702c02c601ac60a4ad15f1529c3fc82f284beb378181b1a7f98

                                                        SHA512

                                                        606f0bcb2ad880e7b33852c1b0775bc7b300bb63337bdac7af4276ee1d0c165503aa21de310c17502dddc970ff28a484de115002b3ec74a0305719faf952a7b3

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        7f4a4049432e4d2be5a92e48b93eb5bf

                                                        SHA1

                                                        da9bd0a1578226e1f4031561bf2579cff19f9fb6

                                                        SHA256

                                                        4e6cfe5da5b844eb599e3cf0ef74b340bbd26a68170eb685a4d0d6ecec253471

                                                        SHA512

                                                        7ef1f419a9ec5c5393d7fce008cd26c5bfd342af59bcda93a6f20622cc1f7c8110cf9d14e86f14d34b9a5841a00896f52c111c5f16d93228b38effee19c7379c

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        fc25f3cc50b27bafe407f896c0ceaf9c

                                                        SHA1

                                                        2145607e23befec609e8095eeb231cd721d329ab

                                                        SHA256

                                                        9e1dcefdc4726c00aec5332e5dcdf17a1740cbd115198c92043f1921b753ead5

                                                        SHA512

                                                        8636b4b8aaebdb0278f590c03c62a398f2b54ab17ffb29062296daeb6a84c388c13a4b51a59f609ee3121670589d0b37aaeb13e8a2d242303269ea1ba2b3eb8e

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                        Filesize

                                                        15KB

                                                        MD5

                                                        b96c1ed7fa9b3fd5a5e5f2dc33660b85

                                                        SHA1

                                                        104296754b341f1846caf22480143b045963e29c

                                                        SHA256

                                                        9270ac2d24d4d5f1b88369d237c9a4f8c2eb0803c2bcf90fdc46cd4021c19857

                                                        SHA512

                                                        beff75280d3071b87d9d75a982c4454a263a79ad5b65764bd598fb60fe5d1834eedd3a40adf7fa9aa11d1a42cf13419ec6d7d967606abd721f8e8f4868d4d94d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index

                                                        Filesize

                                                        120B

                                                        MD5

                                                        79bf495b89f6d20a0cd08bc2982461f6

                                                        SHA1

                                                        5b0e3bb01aa04bf703ffd3b7fa25bbd38ec6d64f

                                                        SHA256

                                                        ff01dd0350d3419d758bd2c3bad8dba5efa8a1cfae5182f3034e7965201186af

                                                        SHA512

                                                        78f1044252e9d85cb9ffa46079b96e698ddef3d55e04bcd028af2696bf4cf937da313bd0e8a30e30ed41b305aac5784388792e1a6232fc92775656b147565cdb

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                        Filesize

                                                        96B

                                                        MD5

                                                        ee6d890354d249abad3899efb2403d84

                                                        SHA1

                                                        69cc5d9b54876ec1b9c1ae7676c08d92dc5835ad

                                                        SHA256

                                                        da02c345bc3c79c832b66fb05e2bf4eaceecc692a5d5d23e8e3c0d77903201c2

                                                        SHA512

                                                        40c9a80154f7ce9e2d97fd616a407ff7304ce45090dbf41eb2554892cb7f624e8b775882711e350b6132e401aa0be0cb934aaecd0a9f49c96127a01660c974bb

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                        Filesize

                                                        72B

                                                        MD5

                                                        098961328fe7c5a1c438be3e2ee4b75d

                                                        SHA1

                                                        b600ad4232306fc092a5f06cbb593e1890453e9e

                                                        SHA256

                                                        c625838dc827c0e9dec28dc185e3e10a7f01ef40b7c748b9b545651b8f22b587

                                                        SHA512

                                                        b552a171a97f83436470844990042336fd18d33ceb674a77e704fb59753ef63379624cbb35a68c4cb3efe803486c499b3d67c7a0a92457dee0667469610a6a44

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57bbaf.TMP

                                                        Filesize

                                                        48B

                                                        MD5

                                                        7103509ce551777b3723444dbf894a9f

                                                        SHA1

                                                        ec1556e862398b2c5131096c3c54af644c54d1de

                                                        SHA256

                                                        3520595429bed76880beda488649356f85b343019ee0167703c856c32323f98a

                                                        SHA512

                                                        7b2787dc941558dd87435f4fe5d6dcf599b8b40aa0444b81f09ab9c15f0d097ca1575154bf6d51a6637ff780207d439b7d01798562a9906862ed896e7c8a2e75

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        81KB

                                                        MD5

                                                        08412bc60b2ab52b9c7400759a16b2d0

                                                        SHA1

                                                        fc27e39103e080dd1d02c6dcc751f2de15b04bf2

                                                        SHA256

                                                        f113b310b79de6c2fd75e2eba3a347d9809295ba3c8aa422ac4202e6cdf021f2

                                                        SHA512

                                                        a91dd9c027966e0c68f0cd739e2b0e6c37fd7a1296d1da1b2cf4537362064c765a871d2bbeeb8fca7875e9594f8cb1cef9f2915120daf27e311a2089d64d8bdb

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        81KB

                                                        MD5

                                                        977e6ea71cc0c963d4ba739d8f8f562c

                                                        SHA1

                                                        ce71c8abd6e6107cf19d4eb867545f6082df2b12

                                                        SHA256

                                                        50b529aeade2dca6de29049bf00efd87e43a434e76b96f66bb7ea4d968668d13

                                                        SHA512

                                                        b61e37643132a02977b0b7b534b90bd86c4fd7a9e6237d539281ba71f78d02a39da3d8c1abe598faaec0123af18827ecc2c9e4aa9bf7860318e1539c6e371c2d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        81KB

                                                        MD5

                                                        22a9b8e1cb3c5b73cd7f8ac81258f49e

                                                        SHA1

                                                        fe54157a091daf1d8d9e8699f154de8a0554150a

                                                        SHA256

                                                        d31873573647b4a9dc23f874a04edcd023ebf0d2d457c8a7dec41715a74fc912

                                                        SHA512

                                                        e13a951b5c79fa3f4d1485a46135274d19dbe8efe99a77654b763a61a512e97a9a6a30c94099b052c32f36e1c12bd0c20fae9357402f68be8b87f20b070eb576

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        81KB

                                                        MD5

                                                        e3363f2c26d35d045b1844e9e4963396

                                                        SHA1

                                                        9f81d37ae51d3cc830b031d0e0bcd6dc7dcbb6ef

                                                        SHA256

                                                        e87e8f08885572ae128182ef33a936e49c24a2287e75f43cb089174930f1df2a

                                                        SHA512

                                                        0f7398b3dc167ca3c931c95441ef5054531c6118e0bb7c60a7634f883942ef8d906073a31bf22214a902b88abd90916bd098551e3f7e1ae18378692f3d47f13f

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        80KB

                                                        MD5

                                                        a47ee1c77588037a0d282b99043f41c0

                                                        SHA1

                                                        85d44962cf831022f8b2042744b363a94a6f9a34

                                                        SHA256

                                                        cf635e4dc8251606529c787381a1d8c54e7757130cf0be1f92e00ab3e7b9a56a

                                                        SHA512

                                                        90850078da71071ac5e34596f20fd553708712386f197632c07fb80a812688eb7fb7e72cb0b2cf75e37e2af6e42262086d1abe34ef9662d735015c7a5f368938

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        81KB

                                                        MD5

                                                        62e37c49800ea6d199d8e72e84f95c47

                                                        SHA1

                                                        2e2ce21d49b975de1e1b53b0994b6eeb07481122

                                                        SHA256

                                                        78eb44390b4ba6f85ac11fcf9f843cb9d604cc673abcf919b192b68072bb247d

                                                        SHA512

                                                        5324b5fe7beac56805ba5f74d0653a6f49aa7caef293fed113114ecfbce18f8a1d8a3a95c080fd2c4e47ad35700f67739145a41f4d08f63b539cb2c74ca54568

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        4280e36a29fa31c01e4d8b2ba726a0d8

                                                        SHA1

                                                        c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                                                        SHA256

                                                        e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                                                        SHA512

                                                        494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        5283c1e411ca94856534e2127905f528

                                                        SHA1

                                                        36b8aabcc97f1cb2d5327e42b18a9859d19fc768

                                                        SHA256

                                                        3846bf6681f155444e7a895234027ec5670bfe9d44e38a06e80fe284a74f0e1e

                                                        SHA512

                                                        cb5679a53ff22a56eeb6a43d52f56d478d5f4796d8919e959adf003e5eb79135172d39030770e49ebb2297e234471c498a475a7daede8fcf6dfe1ffd60e84fb5

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        ba91d30f7223fca6a86c61de426007bb

                                                        SHA1

                                                        d462b739696e27408233f0b15b536ec6ed6bc4e0

                                                        SHA256

                                                        d422028c9047cacc8ad4926343210aec2f2b636c8ca33ac58293e2431e966370

                                                        SHA512

                                                        617fbef60ada4fb2c746b73601315a28ce4bb2ff10fdd254684799c5065d4583982a537a33dd0421bb1fe887450ae0f58ffc519f2291deb4448d5cc83f969193

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        289e0486d83a8b6788a5bb7e4f0c4b7a

                                                        SHA1

                                                        8fe64c151509863347838c9b6239237ed8ceeacf

                                                        SHA256

                                                        ca812accb877899c05c209b3183077d047f7fa8918d84e6012362c3fee10063a

                                                        SHA512

                                                        5cecb8b34ccf6b1b3f0051cfd744acf755105f8defae2761178d22728e7eb5feabeb3c1b877c8a69e16f6ddac27d58a5cd3249b304084c0a59b9f86236376db8

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\VCRUNTIME140.dll

                                                        Filesize

                                                        87KB

                                                        MD5

                                                        656ffcbfe10e81b64a59f7bfc86581ea

                                                        SHA1

                                                        765fe7b0bd404cb6fabb1b16372f2e41889f087b

                                                        SHA256

                                                        e72cb60bc3afaed6f38fa28d7111938067a9e4bed38a36f7a1ac6b9c1f16d0e2

                                                        SHA512

                                                        c5dfc2991cc382d5f9a03219f3e58c3c51b1baa77972d97548fa89b2c5a37d3eb80b1c7e2dae3e3336d02b755a53d78751f49d60250c4cb6ebcaa7a7756e1a18

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\_bz2.pyd

                                                        Filesize

                                                        81KB

                                                        MD5

                                                        96a178d6c0bd9bfb6d9d13e66ddee852

                                                        SHA1

                                                        1b912e886e04fea79a62859e028e688c1ab0d5db

                                                        SHA256

                                                        cc1f76aef007937ddb05401e3962013960d19b3ba2e72a908bfceff8018c10f5

                                                        SHA512

                                                        12425566fb21547f2b5bad874b9b45cae82b70667a77bb95f08567df976faaea2f4fe000c5c07139adb724f2cf0f264271b66b1567591b64f60a8151e11a8646

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\_ctypes.pyd

                                                        Filesize

                                                        117KB

                                                        MD5

                                                        3b8eba4ff8a64a4a06a410f68c9ef341

                                                        SHA1

                                                        6a3fff46b818c13b8043c4caeae5f67ef41d85ad

                                                        SHA256

                                                        6182cc22d0984431c2be0e8023f06c80762b11ff6da3de241f32a428595fac0d

                                                        SHA512

                                                        514faf2288c3b4c17be72a2cb48ec17686c5c2731da5655d062a1f78464690d6300c8c6b889f320320ceaea48ee874ecaece5a98d9320e6bd57a827c203551bf

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\_decimal.pyd

                                                        Filesize

                                                        228KB

                                                        MD5

                                                        eca3e7f019f75c9588103799df72824a

                                                        SHA1

                                                        a6888d59a71ebb641fb8a62cb61ed3525a38ecd8

                                                        SHA256

                                                        e310be82737da95a802b633290b65bdcea3490e95820e10164e5e6c6d570794d

                                                        SHA512

                                                        6a547f380c5e67db8b8edd08fb6842843bd0436a352990fa09ff9003085a9c5bf88a6c9d8f48aad47b8b1403fcb685fa5be1e7fef174126099bcc575fc1b2ed9

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\_hashlib.pyd

                                                        Filesize

                                                        50KB

                                                        MD5

                                                        c2fc077ad8feabf0090e0ee66c8738f0

                                                        SHA1

                                                        ad21eb10251bee784ec14fdfd2ec4371b9d144a4

                                                        SHA256

                                                        960ded1104ac35c5044b9fd426c5c7dbeab21c310221d3a9c61ecb047c22bde2

                                                        SHA512

                                                        b96776e6e7bc24ef8cdf807905b8a265401e9b927efe3033711ebb712ca5cbf4ad186b682f357fe1403d1dee707202fb7d3c709a8a772171b28fdf70c499df76

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\_lzma.pyd

                                                        Filesize

                                                        144KB

                                                        MD5

                                                        86be195013ad54d6d5a62456293d83b7

                                                        SHA1

                                                        15cb3149540077eeee65e5c82ad4fb7d36f4fc4f

                                                        SHA256

                                                        2416b94a38638ce3a3d0f9235d79acdcf16817aead809c9180dd52cb9bb94d57

                                                        SHA512

                                                        ba90de691bf151f1a6263a61ec0aaf144f09dad5681c0661897f3d2da86396f9d8021b98a335c50b0b1bbe34caa714f778acb28a81c3c8ea437166c104b501c0

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\_socket.pyd

                                                        Filesize

                                                        73KB

                                                        MD5

                                                        02e2772e42b92efd1536d8d93bad4914

                                                        SHA1

                                                        e156616d8156bb99b85c7fbab4d78687c9f0f1fc

                                                        SHA256

                                                        beb457b0d80c7118982a6347f5c39d2f358ff7f2d5a8972ac7e9f0aa886e8709

                                                        SHA512

                                                        5088aae0385a36ca41825c57c4bd813d389af929a901adf07a509b234c653c6216aabd55787676d41a114dacfc52a186d4e331e646fb177264d48f934c082268

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\base_library.zip

                                                        Filesize

                                                        1.3MB

                                                        MD5

                                                        07cdb90ac286be52d8020340263de89e

                                                        SHA1

                                                        9d3dcae4b55325fd26efb36f7075daf8e67d2dc6

                                                        SHA256

                                                        ccc20df9dcf2381e8b8a209356f70622844f47c25b6f5ef25affdcbe992bcff3

                                                        SHA512

                                                        8cad3ec295bd7e3c83e111f9acc6253fdbff468456679d1c31f1bd57f86824a3f484b3a8a9aefddb439c5a6ead5dcac96fa91eca1851779aa8bb152f5a5092e9

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\libcrypto-3.dll

                                                        Filesize

                                                        3.3MB

                                                        MD5

                                                        6a0059679746758aeae70c68128d6125

                                                        SHA1

                                                        176b3161828d43442864825132fe5e7fd77c3bbb

                                                        SHA256

                                                        36c1a3b66539e072e43579bfcdef4375c49bf55bb1b3d264939757a9a77fa288

                                                        SHA512

                                                        5f85507e0aeb16eda8c1b7afe8531622e2f2d29379aec3ce1bfe263b8e4f24ce2ec20877b4870b657366a1a6e5650879db9ae6a02685c1a6e26e3234e9f93d2f

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\libffi-8.dll

                                                        Filesize

                                                        34KB

                                                        MD5

                                                        74d2b5e0120a6faae57042a9894c4430

                                                        SHA1

                                                        592f115016a964b7eb42860b589ed988e9fff314

                                                        SHA256

                                                        b982741576a050860c3f3608c7b269dbd35ab296429192b8afa53f1f190069c0

                                                        SHA512

                                                        f3c62f270488d224e24e29a078439736fa51c9ac7b0378dd8ac1b6987c8b8942a0131062bd117977a37046d4b1488f0f719f355039692bc21418fdfbb182e231

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\python313.dll

                                                        Filesize

                                                        5.2MB

                                                        MD5

                                                        cf4253250e19a2703eb9033856739d8a

                                                        SHA1

                                                        de4bdd31f784955ad6fc11727dad46a9f546c044

                                                        SHA256

                                                        3058af6dfbc286f7cfe1b27fee7b844a277853c5e5b913dc1605074d9dc1591e

                                                        SHA512

                                                        85528ec043279a23f02f4998dc7f04942631e2bc661f2e7cc05dcb633ce61e4b0e2ebc851e02f381ece573210976f209e001dd3fd27d35f49679610cf8c40cbb

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\select.pyd

                                                        Filesize

                                                        28KB

                                                        MD5

                                                        9b751949a8d62a3f90a5e462a6bbabd9

                                                        SHA1

                                                        6367f543a2e87abfd613433ec8734f0524064a26

                                                        SHA256

                                                        9eb1f982d47cc870cde1a4ef6c68c8086feb1fd55a6c40cf14bf3264bd99fd05

                                                        SHA512

                                                        c12b53d977a063b79fb550e9c35fbb56ec21b0d0e4f9daf5b4ad4a41dbea34a31c816c0f1939841ac0aeafaf55f4fa1ed8f62ad9f76c372157f5251548141e0f

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\setup.exe

                                                        Filesize

                                                        3.6MB

                                                        MD5

                                                        593b7497327222d69048f7f6204b1886

                                                        SHA1

                                                        56ee397b91b5235ad5fb3259e35676c633b46022

                                                        SHA256

                                                        4963532e63884a66ecee0386475ee423ae7f7af8a6c6d160cf1237d085adf05e

                                                        SHA512

                                                        45999be23e1ae2229575e6f32e56b57a732f51f015b2edb31653837a5592d6ed0edb29783eb21a18a42585ea5c0a50a8a996732233a2202f66eb1242d2a56fc1

                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI16322\unicodedata.pyd

                                                        Filesize

                                                        685KB

                                                        MD5

                                                        b99d52bd8304342c7b3c01dd67790a38

                                                        SHA1

                                                        396b74932e74e8a7ea5f2ae8f1023631b54eea6e

                                                        SHA256

                                                        d02a672cff3c2b91806589d447aca4f632226fd27b670523b6330404e95e53dd

                                                        SHA512

                                                        bea33046c3ad8c51127a7bf4b8846de2e79ed49521b2c305ae4f98a3cc74143188acca6d5a3b8a38f445cbd801c92e8793c4aef3d416b41562fa8671a5b5468a

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lysfyna0.k4f.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\Downloads\Unconfirmed 52622.crdownload

                                                        Filesize

                                                        7.8MB

                                                        MD5

                                                        dee909cc4f9c3df51fd2055b27c2933a

                                                        SHA1

                                                        4fd7f826169b83b0bfa8a9a7dc256adb87d91179

                                                        SHA256

                                                        57935075f1272e62660ca344e4baf9e5a7651c02e4d44674117e302c00adf651

                                                        SHA512

                                                        e64adcaad4218097bc4dc9d444a50ed34797f89552f1752a137c6b2bb88cb7fbc280417b558031189a34c3ad4cc381c2928e91eb1228ed9c8dfc2b134d301a19

                                                      • memory/1784-244-0x0000000070400000-0x000000007044C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/1784-238-0x0000000005A60000-0x0000000005DB4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/2580-1015-0x0000014873D80000-0x0000014873D81000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2580-1018-0x0000014873D80000-0x0000014873D81000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2580-148-0x000001487C7B0000-0x000001487C7B1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2580-147-0x000001487C7B0000-0x000001487C7B1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2580-149-0x000001487C8C0000-0x000001487C8C1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2580-145-0x000001487C780000-0x000001487C781000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2580-129-0x0000014874440000-0x0000014874450000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/2580-113-0x0000014874340000-0x0000014874350000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/2580-1023-0x000001487C580000-0x000001487C581000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3892-222-0x0000000070400000-0x000000007044C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/3892-220-0x00000000058A0000-0x0000000005BF4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/5356-205-0x0000000006F60000-0x0000000006F7E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/5356-194-0x0000000006FA0000-0x0000000006FD2000-memory.dmp

                                                        Filesize

                                                        200KB

                                                      • memory/5356-183-0x0000000006340000-0x0000000006694000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/5356-195-0x0000000070400000-0x000000007044C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/5356-208-0x0000000007DA0000-0x0000000007DAA000-memory.dmp

                                                        Filesize

                                                        40KB

                                                      • memory/5356-209-0x00000000067F0000-0x0000000006816000-memory.dmp

                                                        Filesize

                                                        152KB

                                                      • memory/5356-207-0x0000000007F20000-0x0000000007F36000-memory.dmp

                                                        Filesize

                                                        88KB

                                                      • memory/5356-206-0x0000000007BA0000-0x0000000007C43000-memory.dmp

                                                        Filesize

                                                        652KB

                                                      • memory/6100-152-0x00000000055E0000-0x0000000005602000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/6100-150-0x0000000002C80000-0x0000000002CB6000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/6100-154-0x0000000005E60000-0x0000000005EC6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/6100-151-0x00000000056C0000-0x0000000005CE8000-memory.dmp

                                                        Filesize

                                                        6.2MB

                                                      • memory/6100-153-0x0000000005CF0000-0x0000000005D56000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/6100-178-0x0000000007BF0000-0x000000000826A000-memory.dmp

                                                        Filesize

                                                        6.5MB

                                                      • memory/6100-179-0x0000000006AF0000-0x0000000006B0A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/6100-168-0x00000000065D0000-0x000000000661C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/6100-167-0x00000000065A0000-0x00000000065BE000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/6100-164-0x0000000005F60000-0x00000000062B4000-memory.dmp

                                                        Filesize

                                                        3.3MB