Resubmissions

27-06-2022 01:03

220627-bevbpaadc9 10

26-06-2022 22:58

220626-2xxsmsfga3 10

Analysis

  • max time kernel
    1200s
  • max time network
    1201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    27-06-2022 01:03

General

  • Target

    35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e.exe

  • Size

    240KB

  • MD5

    180332aa8761749cb03a06e000e614f2

  • SHA1

    4be7216002a0b13c2c7772728e1c0047f5d39f85

  • SHA256

    35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e

  • SHA512

    838b214cca0aa92987e01cb83aeabe5f5d404dc9d90332fee869c42883abe27a59f4e06c4939502f51ae8ac358f24f2ec866317fb52baea0e415b3ed383c61be

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 23 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Loads dropped DLL 30 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e.exe
    "C:\Users\Admin\AppData\Local\Temp\35d1fa7feffeb02de85e5726deb2c229d45ef193a1684afd97faeb01f1166e0e.exe"
    1⤵
      PID:2748
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 516
        2⤵
        • Program crash
        PID:3020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2748 -ip 2748
      1⤵
        PID:5056
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ConvertToPush.dib"
        1⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2888
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
        1⤵
          PID:3124
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:3692
          • C:\Windows\system32\mspaint.exe
            "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\ConvertToResize.png" /ForceBootstrapPaint3D
            1⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:3856
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
            1⤵
            • Drops file in System32 directory
            PID:4068
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:4272
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Pictures\EnableBlock.svg
            1⤵
            • Adds Run key to start application
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:444
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffda92446f8,0x7ffda9244708,0x7ffda9244718
              2⤵
                PID:1412
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3373788734699324139,10333578795963934114,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
                2⤵
                  PID:5072
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,3373788734699324139,10333578795963934114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:3
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5048
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,3373788734699324139,10333578795963934114,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:8
                  2⤵
                    PID:3744
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3373788734699324139,10333578795963934114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:1
                    2⤵
                      PID:1292
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3373788734699324139,10333578795963934114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:1
                      2⤵
                        PID:1176
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,3373788734699324139,10333578795963934114,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5280 /prefetch:8
                        2⤵
                          PID:3660
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,3373788734699324139,10333578795963934114,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5428 /prefetch:8
                          2⤵
                            PID:4080
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:608
                          • C:\Program Files\Internet Explorer\iexplore.exe
                            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Pictures\HideCopy.gif
                            1⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SetWindowsHookEx
                            PID:4492
                            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4492 CREDAT:17410 /prefetch:2
                              2⤵
                              • Modifies Internet Explorer settings
                              • Suspicious use of SetWindowsHookEx
                              PID:2768
                          • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                            "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ClearSplit.odt"
                            1⤵
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious use of SetWindowsHookEx
                            PID:4072
                          • C:\Program Files\VideoLAN\VLC\vlc.exe
                            "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ResizeSearch.mpeg"
                            1⤵
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            PID:3624
                          • C:\Windows\system32\mspaint.exe
                            "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\My Wallpaper.jpg" /ForceBootstrapPaint3D
                            1⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of SetWindowsHookEx
                            PID:2144
                          • C:\Windows\system32\OpenWith.exe
                            C:\Windows\system32\OpenWith.exe -Embedding
                            1⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:3448
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
                            1⤵
                            • Adds Run key to start application
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            PID:3804
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda92446f8,0x7ffda9244708,0x7ffda9244718
                              2⤵
                                PID:4168
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:2
                                2⤵
                                  PID:3372
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:3
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4308
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:8
                                  2⤵
                                    PID:3436
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                                    2⤵
                                      PID:1636
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4016 /prefetch:8
                                      2⤵
                                        PID:4688
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                                        2⤵
                                          PID:1308
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3812 /prefetch:2
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2224
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4572 /prefetch:8
                                          2⤵
                                            PID:2888
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:8
                                            2⤵
                                              PID:3668
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2832
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:1
                                              2⤵
                                                PID:1876
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5636 /prefetch:8
                                                2⤵
                                                  PID:1824
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5180 /prefetch:8
                                                  2⤵
                                                    PID:3400
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2004 /prefetch:8
                                                    2⤵
                                                      PID:4816
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 /prefetch:8
                                                      2⤵
                                                        PID:3676
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1536 /prefetch:8
                                                        2⤵
                                                          PID:4840
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:8
                                                          2⤵
                                                            PID:4128
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3688 /prefetch:8
                                                            2⤵
                                                              PID:2888
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3000 /prefetch:8
                                                              2⤵
                                                                PID:2868
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2236,10841287911393042089,11393857901031873102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5720 /prefetch:8
                                                                2⤵
                                                                  PID:2112
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:540
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
                                                                  1⤵
                                                                  • Drops file in Program Files directory
                                                                  PID:5048
                                                                  • C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5048_1249285308\msedgerecovery.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5048_1249285308\msedgerecovery.exe" --appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062} --browser-version=92.0.902.67 --sessionid={cc4730f8-081e-4a1b-808d-2d1bae217c78} --system
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    PID:4432
                                                                    • C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5048_1249285308\MicrosoftEdgeUpdateSetup.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5048_1249285308\MicrosoftEdgeUpdateSetup.exe" /install "runtime=true&needsadmin=true" /installsource chromerecovery /silent
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in Program Files directory
                                                                      PID:4636
                                                                      • C:\Program Files (x86)\Microsoft\Temp\EU43BA.tmp\MicrosoftEdgeUpdate.exe
                                                                        "C:\Program Files (x86)\Microsoft\Temp\EU43BA.tmp\MicrosoftEdgeUpdate.exe" /install "runtime=true&needsadmin=true" /installsource chromerecovery /silent
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Sets file execution options in registry
                                                                        • Loads dropped DLL
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1884
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Modifies registry class
                                                                          PID:2084
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Modifies registry class
                                                                          PID:4764
                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.157.61\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.157.61\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            • Registers COM server for autorun
                                                                            • Loads dropped DLL
                                                                            • Modifies registry class
                                                                            PID:1248
                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.157.61\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.157.61\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            • Registers COM server for autorun
                                                                            • Loads dropped DLL
                                                                            • Modifies registry class
                                                                            PID:1160
                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.157.61\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.157.61\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            • Registers COM server for autorun
                                                                            • Loads dropped DLL
                                                                            • Modifies registry class
                                                                            PID:4184
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjEuMy4xNTcuNjEiIGxhbmc9IiIgYnJhbmQ9IiIgY2xpZW50PSIiPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIGluc3RhbGxfdGltZV9tcz0iNzM0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          PID:816
                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /machine /installsource chromerecovery
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:684
                                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Modifies data under HKEY_USERS
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:4728
                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249Ijg5LjAuNDM4OS4xMTQiIG5leHR2ZXJzaW9uPSI4OS4wLjQzODkuMTE0IiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI3MyIgaW5zdGFsbGRhdGU9Ii00IiBpbnN0YWxsZGF0ZXRpbWU9IjE2NDk5NjE4MjkiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSI1IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    PID:3636
                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{26517990-C553-439A-8FE9-99B685552EA2}\MicrosoftEdgeUpdateSetup_X86_1.3.163.19.exe
                                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{26517990-C553-439A-8FE9-99B685552EA2}\MicrosoftEdgeUpdateSetup_X86_1.3.163.19.exe" /update /sessionid "{3AB1DEB7-B837-4687-8D13-F42B50FE2715}"
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in Program Files directory
                                                                    PID:1552
                                                                    • C:\Program Files (x86)\Microsoft\Temp\EUEF6B.tmp\MicrosoftEdgeUpdate.exe
                                                                      "C:\Program Files (x86)\Microsoft\Temp\EUEF6B.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{3AB1DEB7-B837-4687-8D13-F42B50FE2715}"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Sets file execution options in registry
                                                                      • Loads dropped DLL
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4304
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Modifies registry class
                                                                        PID:4644
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Modifies registry class
                                                                        PID:4588
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.163.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.163.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Registers COM server for autorun
                                                                          • Loads dropped DLL
                                                                          • Modifies registry class
                                                                          PID:1508
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.163.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.163.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Registers COM server for autorun
                                                                          • Loads dropped DLL
                                                                          • Modifies registry class
                                                                          PID:2116
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.163.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.163.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Registers COM server for autorun
                                                                          • Loads dropped DLL
                                                                          • Modifies registry class
                                                                          PID:2780
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNjMuMTkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNTcuNjEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7M0FCMURFQjctQjgzNy00Njg3LThEMTMtRjQyQjUwRkUyNzE1fSIgdXNlcmlkPSJ7NzY5MDcwN0MtNDE3Ny00MEIwLTg5QUYtQTk3NEQ2QjMzRTVFfSIgaW5zdGFsbHNvdXJjZT0ic2VsZnVwZGF0ZSIgcmVxdWVzdGlkPSJ7Q0FFNzQyMjQtQ0U3Qy00MkRDLTg2MzktODlEOTRBREZEMDFFfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSJEQURZIiBwcm9kdWN0X25hbWU9IlN0YW5kYXJkIFBDIChRMzUgKyBJQ0g5LCAyMDA5KSIvPjxleHAgZXRhZz0iJnF1b3Q7cjQ1MnQxK2syVGdxL0hYemp2Rk5CUmhvcEJXUjlzYmpYeHFlVURIOXVYMD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iMS4zLjE1Ny42MSIgbmV4dHZlcnNpb249IjEuMy4xNjMuMTkiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY2hyb21lcmVjMz0yMDIyMjZSIiBpbnN0YWxsYWdlPSIwIiBpbnN0YWxsZGF0ZXRpbWU9IjE2NTYyOTk4MjUiPjxldmVudCBldmVudHR5cGU9IjMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjEyMjE1NjgxNTI0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        PID:2340
                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0Ii8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNTcuNjEiIG5leHR2ZXJzaW9uPSIxLjMuMTYzLjE5IiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNocm9tZXJlYzM9MjAyMjI2UiIgaW5zdGFsbGFnZT0iMCI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSIxMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIGRvd25sb2FkZXI9ImJpdHMiIHVybD0iaHR0cDovL21zZWRnZS5iLnRsdS5kbC5kZWxpdmVyeS5tcC5taWNyb3NvZnQuY29tL2ZpbGVzdHJlYW1pbmdzZXJ2aWNlL2ZpbGVzLzlkNjgzMjc0LTQ4OTMtNGZmZS1iYTkyLWZiYjAxMzJlZmM0Mz9QMT0xNjU2ODk3NDY3JmFtcDtQMj00MDQmYW1wO1AzPTImYW1wO1A0PW1BZ3k4QTViQjlFRFFVRlUlMmI2Q1d5N0ZETnFqZVhRV21FRVR6U1pmRFB0bFo1QVRMOTRTcjhCRVdaajk0NmJKUjVNdll4UGZpUGpSWnM0VmxwNzFNS3clM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIxODMxODU2IiB0b3RhbD0iMTgzMTg1NiIgZG93bmxvYWRfdGltZV9tcz0iNDUzIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIvPjxwaW5nIHI9IjczIiByZD0iNTU4MyIgcGluZ19mcmVzaG5lc3M9IntBOTJCRDA5NC04RDRFLTQ4QzctODk5OS05RkJDNzcxNzU5OUN9Ii8-PC9hcHA-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjkyLjAuOTAyLjY3IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzAwNzcyODY5MDEyMjc2Ij48dXBkYXRlY2hlY2svPjxwaW5nIGFjdGl2ZT0iMSIgYT0iLTEiIHI9IjczIiBhZD0iLTEiIHJkPSI1NTgzIiBwaW5nX2ZyZXNobmVzcz0ie0E4Q0NBRDg3LTVFN0MtNDg3MC04MTk1LUIzQTUxMkY0OEFFRH0iLz48L2FwcD48L3JlcXVlc3Q-
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    PID:984
                                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2928
                                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  PID:2904

                                                                Network

                                                                MITRE ATT&CK Enterprise v6

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                  Filesize

                                                                  152B

                                                                  MD5

                                                                  f0e3ac67c976d7fac8c950488be02c3b

                                                                  SHA1

                                                                  ba07b838c3298d77e077dbb37619611cd5e5a5e9

                                                                  SHA256

                                                                  34ed3321d7819cf644722104ac595ad8b5d54c7d11989da017f4dec6b8efc4a1

                                                                  SHA512

                                                                  6718c3465f79747fe7ab39cbb13bdea8a5fca830cf5a91893f0f5eff39f378e058f167a291b0fc26e75d35c6325d8fd4f0432aab78b3724435ba1f4f8f700100

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_0

                                                                  Filesize

                                                                  44KB

                                                                  MD5

                                                                  17d139716e85501b6309cc1caa442a8a

                                                                  SHA1

                                                                  3013b0b1e219b820eb96db8985aa2e457e319f2b

                                                                  SHA256

                                                                  2a6549527c4c3537826153feb493e8206e68a87fb5c7f60629d62b889c0deb57

                                                                  SHA512

                                                                  c1a48b4015f1e5fca17c3296486073ec8c2ee6e278dc96beb97f7305eee69856b4432297b4aca97947e6b1b0dea8e1d4936d3e85ea1f9e72aa3bc2c698402d20

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_1

                                                                  Filesize

                                                                  264KB

                                                                  MD5

                                                                  870eb6ad721e52be16c030af7e75b4ac

                                                                  SHA1

                                                                  4a3ba2d0dc561746322fb6f64c316fe1857f4486

                                                                  SHA256

                                                                  82d417919117fff4e4c5b95bcd9a5a5dcd6534e2a84fe0e1379e264f1215f4bc

                                                                  SHA512

                                                                  eb1bf8a5faaf76ef0f001eda9b9212c0e707cd7b0b4865fed549e66af7046024658e8d837f97968892cad8f763277b17987a2e96e834ae3ecd7e1431f4ff501a

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_2

                                                                  Filesize

                                                                  8KB

                                                                  MD5

                                                                  0962291d6d367570bee5454721c17e11

                                                                  SHA1

                                                                  59d10a893ef321a706a9255176761366115bedcb

                                                                  SHA256

                                                                  ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                  SHA512

                                                                  f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_3

                                                                  Filesize

                                                                  4.0MB

                                                                  MD5

                                                                  6f44273514ef7519472e750d9678032a

                                                                  SHA1

                                                                  2d61d8081003a84a353ec5e46b575bc4e123e300

                                                                  SHA256

                                                                  e01b4e34efdda2f067f872dc4de19512f732ab88e7f8c975d04c5c0d5f86d00f

                                                                  SHA512

                                                                  94fb51682cc4077cc7a43b922bbd69025788f1198ad0be578517088ff3bdebe04a6a3d95ee3094a35081418230f92afb0693dd855aed039b2e8da1e410b80eb3

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\index

                                                                  Filesize

                                                                  256KB

                                                                  MD5

                                                                  bd82375c4980b13813f6588b600b7de1

                                                                  SHA1

                                                                  d99541979f539d7f3282c624c4c7dc899a831b40

                                                                  SHA256

                                                                  a3d693f96e0d4cf099e3e781214517d74d7ffc896bb70bb54ec144622cdb4bcf

                                                                  SHA512

                                                                  6b019cb97780d661e3372f9a1238c042d928e8fb30d23594b7b9e18c5d4f56a905c0e9ac302c6768184b82539347303ed939033a3e902e777e965ff753ce13b6

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                  Filesize

                                                                  48B

                                                                  MD5

                                                                  0f250a82348797b9f5aceb3f0a45dd45

                                                                  SHA1

                                                                  b545f8832ec654d98b38a5ba47a5d99f7f5af4dc

                                                                  SHA256

                                                                  e03eee70f8e4d085a1b2d43a0f5c2d5bfac8a88f7b2b66b05597e931ae2a20c7

                                                                  SHA512

                                                                  e8ac416807e4c50bd77ddb154757732d0937e25a19cbf7c5b72fea1334adab79cf85458add5665129638e007523fac2cd91899752b6e5137265ac8ddd52e5a27

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index

                                                                  Filesize

                                                                  48B

                                                                  MD5

                                                                  0f250a82348797b9f5aceb3f0a45dd45

                                                                  SHA1

                                                                  b545f8832ec654d98b38a5ba47a5d99f7f5af4dc

                                                                  SHA256

                                                                  e03eee70f8e4d085a1b2d43a0f5c2d5bfac8a88f7b2b66b05597e931ae2a20c7

                                                                  SHA512

                                                                  e8ac416807e4c50bd77ddb154757732d0937e25a19cbf7c5b72fea1334adab79cf85458add5665129638e007523fac2cd91899752b6e5137265ac8ddd52e5a27

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                                                  Filesize

                                                                  20KB

                                                                  MD5

                                                                  49693267e0adbcd119f9f5e02adf3a80

                                                                  SHA1

                                                                  3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                  SHA256

                                                                  d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                  SHA512

                                                                  b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\CURRENT

                                                                  Filesize

                                                                  16B

                                                                  MD5

                                                                  46295cac801e5d4857d09837238a6394

                                                                  SHA1

                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                  SHA256

                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                  SHA512

                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOG

                                                                  Filesize

                                                                  279B

                                                                  MD5

                                                                  23fa29b98a9f7855224464480740e299

                                                                  SHA1

                                                                  2edf00c7f0057d52e5868d33ccf07d4c75b26f30

                                                                  SHA256

                                                                  0c66ea5097e29603de5f4d972739aa342b6407655bc76510cdce2892453eaebb

                                                                  SHA512

                                                                  f3f2e1162aa0496bd2bf8b95b9dcfa5398b77832bd9d7e23937f0c6aad37e7b0e6f7d37670b601778064e55fe33c74659a45fa1112fe24c7f0d0984207e15bc1

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\MANIFEST-000001

                                                                  Filesize

                                                                  41B

                                                                  MD5

                                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                                  SHA1

                                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                  SHA256

                                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                  SHA512

                                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_0

                                                                  Filesize

                                                                  8KB

                                                                  MD5

                                                                  cf89d16bb9107c631daabf0c0ee58efb

                                                                  SHA1

                                                                  3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                  SHA256

                                                                  d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                  SHA512

                                                                  8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

                                                                  Filesize

                                                                  264KB

                                                                  MD5

                                                                  f50f89a0a91564d0b8a211f8921aa7de

                                                                  SHA1

                                                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                  SHA256

                                                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                  SHA512

                                                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_2

                                                                  Filesize

                                                                  8KB

                                                                  MD5

                                                                  0962291d6d367570bee5454721c17e11

                                                                  SHA1

                                                                  59d10a893ef321a706a9255176761366115bedcb

                                                                  SHA256

                                                                  ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                  SHA512

                                                                  f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_3

                                                                  Filesize

                                                                  8KB

                                                                  MD5

                                                                  41876349cb12d6db992f1309f22df3f0

                                                                  SHA1

                                                                  5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                  SHA256

                                                                  e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                  SHA512

                                                                  e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\index

                                                                  Filesize

                                                                  256KB

                                                                  MD5

                                                                  5c39b59ecea7cf48b5a0e9386cb32965

                                                                  SHA1

                                                                  8cb757c09e4568e0d5239922c67185271fe35b8a

                                                                  SHA256

                                                                  a69c49b47ed42673416192f98da7364354c63a196340146da1a65e0f70147dd7

                                                                  SHA512

                                                                  ef49e8dc2de62f48fc24df57f40fff4fb1f8a1e8dd00776db8c372fc6118e2cdd3fb1ef1efb24b24ca965f9e4e2a55910718550655605fdf01855b7a0343dae1

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                                  Filesize

                                                                  124KB

                                                                  MD5

                                                                  cd2a7cc28b1b345c31396b425b3b0921

                                                                  SHA1

                                                                  0f3e0180310387d2da9b3be4e603f36af07cccc6

                                                                  SHA256

                                                                  84c0a0bb21e71b66e9625c8cee847983590146b02e743d159330f7933c2c1a85

                                                                  SHA512

                                                                  300d780a1e452017d787f8c1f8428e3533228360793809d73be7a98d3a6422583646b27196e0a773724431814510467342c4f006efb63bba8a52e01336c7d7a1

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History Provider Cache

                                                                  Filesize

                                                                  507B

                                                                  MD5

                                                                  0954946f5b304e508b8d61633ec32f8b

                                                                  SHA1

                                                                  0c9efd3479f5f3430dad7387882907574ef1a297

                                                                  SHA256

                                                                  ec455f8a5e61710164f6f2f1af80ab03cb153e1b0e3d976b20e5c0b67f124416

                                                                  SHA512

                                                                  552f9dbeec78b7c39476f3d4de1f7c7676c195f6772353df34eed6a62cb3412e4b2ab9a952cf48181f14d5bdf9bf0cbf05c923ddca9a04bbf7b38e168d765b73

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG

                                                                  Filesize

                                                                  331B

                                                                  MD5

                                                                  94daa2db57b2e76fb741321340d698a5

                                                                  SHA1

                                                                  1e163e76d349f3a6e186200b327e33585efc0366

                                                                  SHA256

                                                                  dfff8a15207c9fff51d2eefd0a7067d27568c36bdb5a04ce13144f84a260b27f

                                                                  SHA512

                                                                  d266c6bad3a13923a47d98052d8cecc9697aee5ef452cad3e49cf5f043c73ecc03162e34e264938d4ab04e3ada65971b1e7faa9775fa4299819fa561beede047

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  6e21db23946f3f00cd752ddc11c1a591

                                                                  SHA1

                                                                  dc22ee3d94be8ea6b7b881b8040257619bb04bfe

                                                                  SHA256

                                                                  a91cea32d5cc35c27bdf736f2dd378735106bf2e1b3f40fb4ae375ca46b96a27

                                                                  SHA512

                                                                  432d041c0ee98fae6a976cafbe5d366fcae2350ebeb4676dbaa4fa49138c4801b367dfbd65b61690ccfc4cd400f5527c64d36a98228c1208f67a77699b4267bb

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                  Filesize

                                                                  24KB

                                                                  MD5

                                                                  8741731c92531402bb0d53a1b718cf8a

                                                                  SHA1

                                                                  620ae6811c5907cb494e79db2fd81c15aa2341e6

                                                                  SHA256

                                                                  e188aed486801738c34cc8804b5a6c0a4b3176bb6a2407b68a8500e983533fea

                                                                  SHA512

                                                                  88df8cc765e4ded89a64756148f4b60d32ba0ac430789598550d0e3625e1917d520f87459f3b14fe6ffa224ea8ec377991790bef3b1dac19e22053ba67d96f7e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log

                                                                  Filesize

                                                                  99B

                                                                  MD5

                                                                  ba92e5bbca79ea378c3376187ae43eae

                                                                  SHA1

                                                                  f0947098577f6d0fe07422acbe3d71510289e2fc

                                                                  SHA256

                                                                  ccf4c13cd2433fe8a7add616c7d8e6b384cf441e4d948de5c6fc73e9315c619f

                                                                  SHA512

                                                                  aa1d8b7eb9add6c5ed5635295f501f950914affc3fa9aa1ee58167ed110f99a1760b05e4efb779df8e432eab1b2a0fc9cf9d67a05b2d5432ff8f82c620a38a62

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\CURRENT

                                                                  Filesize

                                                                  16B

                                                                  MD5

                                                                  46295cac801e5d4857d09837238a6394

                                                                  SHA1

                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                  SHA256

                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                  SHA512

                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG

                                                                  Filesize

                                                                  279B

                                                                  MD5

                                                                  2444953f14898fa9f23f27efa6b6f34d

                                                                  SHA1

                                                                  095b08501b291efdfeb70f330ab827d9bededff3

                                                                  SHA256

                                                                  096fbd1898deef5c0cb13fbcf1ce126b9c87c7fad95de4a713a12cad4b86bc76

                                                                  SHA512

                                                                  a411bf7cc59c56cba29d13d99326aefad912099eaf63bf41aef72f1a26259f870485a5ca8a89315a3ae3a41dfcf69b7901d7e271ba33b1b89700894e74418334

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\MANIFEST-000001

                                                                  Filesize

                                                                  41B

                                                                  MD5

                                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                                  SHA1

                                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                  SHA256

                                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                  SHA512

                                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Tabs_13300772695047678

                                                                  Filesize

                                                                  877B

                                                                  MD5

                                                                  f6f73a325d2b17f2285b5a5d65724900

                                                                  SHA1

                                                                  797ef967b810e84d4f9b51b11425d70af69a412d

                                                                  SHA256

                                                                  46abdb0ea922953bdf6bc8f366830cf0943033e3554537170c79ebdf58db138d

                                                                  SHA512

                                                                  6bab58538d6e6b546ba50e777bbba63e50f09d1265bd76e7a71e44bd36f903f5562c66b749c683116938640e56ff0d400ae7351d1975389604ba81fe3ab98c58

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG

                                                                  Filesize

                                                                  347B

                                                                  MD5

                                                                  d044dcb188eb10b71117263e72b81320

                                                                  SHA1

                                                                  446c387996442efe5ef3c82a79119faa068012f0

                                                                  SHA256

                                                                  d8e7b6a3f6543c2652f82833d4568a73086e87c130950b108b855509af39d579

                                                                  SHA512

                                                                  49e9c1ec5163217ebd09e4283c2ea784dd96bdc79cef10ec0a366da5aa9dcfd4328a8ffee905990b441ed23ec376c7309b0c4a032d5273650cd5e5fa3b42a19e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG

                                                                  Filesize

                                                                  323B

                                                                  MD5

                                                                  e185cfaf86781c0b4cda8b8e62e80d11

                                                                  SHA1

                                                                  cb7e314e2e28559187d809efb7abd231ac82ef85

                                                                  SHA256

                                                                  f90888958d22fdbf3d3ca63335e609b6a6a226fa1ab95ca8299b8d617cb5b245

                                                                  SHA512

                                                                  a740593ce1a5d8cd3b77277570c88003357216cf9c3b6f84bbebbcee6bfeb620e9e8a191d2707ed6fb14fa3a5ba6bd47fdf4b3e600f76e1786877200b978880e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Top Sites

                                                                  Filesize

                                                                  20KB

                                                                  MD5

                                                                  f44dc73f9788d3313e3e25140002587c

                                                                  SHA1

                                                                  5aec4edc356bc673cba64ff31148b934a41d44c4

                                                                  SHA256

                                                                  2002c1e5693dd638d840bb9fb04d765482d06ba3106623ce90f6e8e42067a983

                                                                  SHA512

                                                                  e556e3c32c0bc142b08e5c479bf31b6101c9200896dd7fcd74fdd39b2daeac8f6dc9ba4f09f3c6715998015af7317211082d9c811e5f9e32493c9ecd888875d7

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                  Filesize

                                                                  203B

                                                                  MD5

                                                                  6e01a9facae09267e35603ae2983d2ae

                                                                  SHA1

                                                                  7f68d96a80e962c6b22643db89b62698d6484f53

                                                                  SHA256

                                                                  62b1507e9b1ebee938e163849216ca86517bd7a756e3c7b3db4fdf32aedb7700

                                                                  SHA512

                                                                  d8cbee8ce73497642cb946b1c30ed88a28b5e7075c7eedefba24499d3dab6590198112055d37ed55b2603c5e7da6d48355d15a0679eaa85cffac5e32132b021c

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links

                                                                  Filesize

                                                                  128KB

                                                                  MD5

                                                                  d48fb3b916ac823d68b923cf0b1aa3d6

                                                                  SHA1

                                                                  551d8ca0b0043531e2212f63b4df15ab3edb2725

                                                                  SHA256

                                                                  eae8f59c729a3b3d7a8dc3051b975e84e525cf52c7bad7bc030b357aff6f07ad

                                                                  SHA512

                                                                  ffad05bc168a620b42b288b06939ecf80fd4427fe72cafbaee290f4b55e40f54b4c772c4cdf7686a8d4cc56077cea228ef45e9b5bb92c6a273e3d4237918bf8e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data

                                                                  Filesize

                                                                  116KB

                                                                  MD5

                                                                  f70aa3fa04f0536280f872ad17973c3d

                                                                  SHA1

                                                                  50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                  SHA256

                                                                  8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                  SHA512

                                                                  30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db

                                                                  Filesize

                                                                  44KB

                                                                  MD5

                                                                  9799920c1ca0b54a411291fb11932c7c

                                                                  SHA1

                                                                  76a015eeb9afe54a8cda9ddc72536db78b061578

                                                                  SHA256

                                                                  3c02398d84c8d4a0ada2945148584742d5da8ce51663a3f06903dab0ce213a08

                                                                  SHA512

                                                                  a18c70442a67c92dfedc68d9c694f9852d2954a5252ec733efe06bedab2a338fddefc242a49c609fd3e9e3d9b319ac9bf028db42500297d75b0fb108cbecb75e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT

                                                                  Filesize

                                                                  16B

                                                                  MD5

                                                                  46295cac801e5d4857d09837238a6394

                                                                  SHA1

                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                  SHA256

                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                  SHA512

                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG

                                                                  Filesize

                                                                  279B

                                                                  MD5

                                                                  49fdbf26f13543f0d7cfbd9b4dc66eac

                                                                  SHA1

                                                                  018f9f3fd4c23b356042a1a5afabaf32ffdc3855

                                                                  SHA256

                                                                  4219b535e16f154acd1fd1b2f5ef7e1bd8fdbd87180248c8a291e591c778b3f9

                                                                  SHA512

                                                                  50a3bbb216c1249bff9198d1a3e24afa9054c527acd293a67f31a3af2844575af07bbd83da55ab7fdf8674df7a91856249900c06b4bd9ff131363c5396e33195

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                                                  Filesize

                                                                  41B

                                                                  MD5

                                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                                  SHA1

                                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                  SHA256

                                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                  SHA512

                                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.log

                                                                  Filesize

                                                                  160B

                                                                  MD5

                                                                  2e19a9040ed4a0c3ed82996607736b8f

                                                                  SHA1

                                                                  5a78ac2b74f385a12b019c420a681fd13e7b6013

                                                                  SHA256

                                                                  2eeb6d38d7aad1dc32e24d3ffd6438698c16a13efd1463d281c46b8af861a8ce

                                                                  SHA512

                                                                  86669994386b800888d4e3acb28ab36296594803824d78e095eb0c79642224f24aca5d2892596ac33b7a01b857367ed3a5e2c2fb3405f69a64eb8bf52c26753f

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                                                  Filesize

                                                                  16B

                                                                  MD5

                                                                  46295cac801e5d4857d09837238a6394

                                                                  SHA1

                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                  SHA256

                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                  SHA512

                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG

                                                                  Filesize

                                                                  297B

                                                                  MD5

                                                                  84b9b4146ca4bb35612d00c3925eedb0

                                                                  SHA1

                                                                  8cd9ac50af57f5a1fcde8a9ececc256e35fb2735

                                                                  SHA256

                                                                  75a1ab477c50655a4296180237262e4338ddf61e99f5765620ad4ac0672f33c6

                                                                  SHA512

                                                                  fcdb6deb8e29e954ca64fb38426c526377e1e1ac22e050a53f96bb0000f0363257f35af3e4145effe4ea3297f8c864ea66ce71076ef1330614c61948088a707e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001

                                                                  Filesize

                                                                  41B

                                                                  MD5

                                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                                  SHA1

                                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                  SHA256

                                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                  SHA512

                                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1

                                                                  Filesize

                                                                  264KB

                                                                  MD5

                                                                  f50f89a0a91564d0b8a211f8921aa7de

                                                                  SHA1

                                                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                  SHA256

                                                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                  SHA512

                                                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                                                  Filesize

                                                                  11B

                                                                  MD5

                                                                  838a7b32aefb618130392bc7d006aa2e

                                                                  SHA1

                                                                  5159e0f18c9e68f0e75e2239875aa994847b8290

                                                                  SHA256

                                                                  ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                                                  SHA512

                                                                  9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  9KB

                                                                  MD5

                                                                  2fafca2c2e699b5b3f8e66ed09d2b41c

                                                                  SHA1

                                                                  f34190f39d7cec4c0437fd299b9d752cc87c2820

                                                                  SHA256

                                                                  ca1b38f92d610435abc4d482eab1e40d7759c61798016ff39f77f0a857255cc7

                                                                  SHA512

                                                                  6e12878a6d4867040c3ffb714b8e07984b1224e85a0f922d0b05ddf8bd479a4a1d2e292920630be188d8b5097a28141ae897a4396dcc87569ffabf0505e13025

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                  Filesize

                                                                  264KB

                                                                  MD5

                                                                  f50f89a0a91564d0b8a211f8921aa7de

                                                                  SHA1

                                                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                  SHA256

                                                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                  SHA512

                                                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\edgeSettings

                                                                  Filesize

                                                                  81B

                                                                  MD5

                                                                  f222079e71469c4d129b335b7c91355e

                                                                  SHA1

                                                                  0056c3003874efef229a5875742559c8c59887dc

                                                                  SHA256

                                                                  e713c1b13a849d759ebaa6256773f4f1d6dfc0c6a4247edaa726e0206ecacb00

                                                                  SHA512

                                                                  e5a49275e056b6628709cf6509a5f33f8d1d1e93125eaa6ec1c7f51be589fd3d8ea7a59b9639db586d76a994ad3dc452c7826e4ac0c8c689dd67ff90e33f0b75

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\edgeSettings_2.0-2f9188b68640dbf72295f9083a21d674a314721ef06f82db281cbcb052ff8ec1

                                                                  Filesize

                                                                  126KB

                                                                  MD5

                                                                  6698422bea0359f6d385a4d059c47301

                                                                  SHA1

                                                                  b1107d1f8cc1ef600531ed87cea1c41b7be474f6

                                                                  SHA256

                                                                  2f9188b68640dbf72295f9083a21d674a314721ef06f82db281cbcb052ff8ec1

                                                                  SHA512

                                                                  d0cdb3fa21e03f950dbe732832e0939a4c57edc3b82adb7a556ebd3a81d219431a440357654dfea94d415ba00fd7dcbd76f49287d85978d12c224cbfa8c1ad8d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\synchronousLookupUris

                                                                  Filesize

                                                                  40B

                                                                  MD5

                                                                  af69267e47b3024eb959cb77732d866c

                                                                  SHA1

                                                                  f629fa15563a91111ee9b58a78a1d65f12ddcc52

                                                                  SHA256

                                                                  47cb6493e7e4af708fffb243508c97880ad1755d779c202a390bc6d579cd58fc

                                                                  SHA512

                                                                  e72ce29ba735cb3c52546ada4a637648edcb3b0a91879e2e77c06c365c114018b12a0fdd7270979e0d46fef1caf2138abf3993878013b2ebfd41ac3a926e91d5

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\synchronousLookupUris_637918852655037125

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  cb41ba3bdcc94800314684069312970b

                                                                  SHA1

                                                                  da3245766337382a31f42bf14b46edc7f9317cbd

                                                                  SHA256

                                                                  101480b18a4b00c8f318202c25260785c415fbc1f794d01a6278bee883161c96

                                                                  SHA512

                                                                  5570b3c72371c2b4ddcdbf60b2306a98df366a33f136428250f4d05e6e8d85056b53e6338ff8887c99715c64cddba96638c927dc771f05b54933ee1331a342a1

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\topTraffic

                                                                  Filesize

                                                                  29B

                                                                  MD5

                                                                  ce545b52b20b2f56ffb26d2ca2ed4491

                                                                  SHA1

                                                                  ebe904c20bb43891db4560f458e66663826aa885

                                                                  SHA256

                                                                  e9d5684e543b573010f8b55b11bf571caf0a225cdea03f520091525978023899

                                                                  SHA512

                                                                  1ea06c8e3f03efdd67779969b4cdf7d8e08f8327298668a7cffd67d1753f33cf19e6995a3d83fe45185c55b950f41e48ac71b422b91e8d0180b5bdd07cfacfe9

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote\topTraffic_637811103879324684

                                                                  Filesize

                                                                  450KB

                                                                  MD5

                                                                  a7aab197b91381bcdec092e1910a3d62

                                                                  SHA1

                                                                  35794f2d2df163223391a2b21e1610f14f46a78f

                                                                  SHA256

                                                                  6337fe4e6e7464e319dfcdadf472987592013cf80d44916f5151950b4a4ca14b

                                                                  SHA512

                                                                  cffd7350d1e69ada5f64cafe42a9d77e3192927e129f2903088b66b6efc9626b5d525aedca08d473ad8fa415af1d816594b243609237dc23716d70a2ca0eb774

                                                                • \??\pipe\LOCAL\crashpad_3804_AINJVBEDJUQIOPZG

                                                                  MD5

                                                                  d41d8cd98f00b204e9800998ecf8427e

                                                                  SHA1

                                                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                  SHA256

                                                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                  SHA512

                                                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                • \??\pipe\LOCAL\crashpad_444_OAXFFPFOHGTXQNGS

                                                                  MD5

                                                                  d41d8cd98f00b204e9800998ecf8427e

                                                                  SHA1

                                                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                  SHA256

                                                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                  SHA512

                                                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                • memory/684-257-0x0000000000000000-mapping.dmp

                                                                • memory/816-256-0x0000000000000000-mapping.dmp

                                                                • memory/984-260-0x0000000000000000-mapping.dmp

                                                                • memory/1160-254-0x0000000000000000-mapping.dmp

                                                                • memory/1176-143-0x0000000000000000-mapping.dmp

                                                                • memory/1248-253-0x0000000000000000-mapping.dmp

                                                                • memory/1292-141-0x0000000000000000-mapping.dmp

                                                                • memory/1308-220-0x0000000000000000-mapping.dmp

                                                                • memory/1412-133-0x0000000000000000-mapping.dmp

                                                                • memory/1508-264-0x0000000000000000-mapping.dmp

                                                                • memory/1552-259-0x0000000000000000-mapping.dmp

                                                                • memory/1636-207-0x0000000000000000-mapping.dmp

                                                                • memory/1824-231-0x0000000000000000-mapping.dmp

                                                                • memory/1876-229-0x0000000000000000-mapping.dmp

                                                                • memory/1884-250-0x0000000000000000-mapping.dmp

                                                                • memory/2084-251-0x0000000000000000-mapping.dmp

                                                                • memory/2112-247-0x0000000000000000-mapping.dmp

                                                                • memory/2116-265-0x0000000000000000-mapping.dmp

                                                                • memory/2224-224-0x0000000000000000-mapping.dmp

                                                                • memory/2340-267-0x0000000000000000-mapping.dmp

                                                                • memory/2748-130-0x0000000002230000-0x000000000225E000-memory.dmp

                                                                  Filesize

                                                                  184KB

                                                                • memory/2780-266-0x0000000000000000-mapping.dmp

                                                                • memory/2832-227-0x0000000000000000-mapping.dmp

                                                                • memory/2868-245-0x0000000000000000-mapping.dmp

                                                                • memory/2888-243-0x0000000000000000-mapping.dmp

                                                                • memory/2888-226-0x0000000000000000-mapping.dmp

                                                                • memory/3372-179-0x0000000000000000-mapping.dmp

                                                                • memory/3400-233-0x0000000000000000-mapping.dmp

                                                                • memory/3436-193-0x0000000000000000-mapping.dmp

                                                                • memory/3636-258-0x0000000000000000-mapping.dmp

                                                                • memory/3660-145-0x0000000000000000-mapping.dmp

                                                                • memory/3676-237-0x0000000000000000-mapping.dmp

                                                                • memory/3744-139-0x0000000000000000-mapping.dmp

                                                                • memory/4068-132-0x00000145AF5A0000-0x00000145AF5B0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4068-131-0x00000145AF560000-0x00000145AF570000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-152-0x00007FFD89370000-0x00007FFD89380000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-158-0x00007FFD89370000-0x00007FFD89380000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-151-0x00007FFD89370000-0x00007FFD89380000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-154-0x00007FFD86CE0000-0x00007FFD86CF0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-153-0x00007FFD86CE0000-0x00007FFD86CF0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-156-0x00007FFD89370000-0x00007FFD89380000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-148-0x00007FFD89370000-0x00007FFD89380000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-159-0x00007FFD89370000-0x00007FFD89380000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-157-0x00007FFD89370000-0x00007FFD89380000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-149-0x00007FFD89370000-0x00007FFD89380000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4072-150-0x00007FFD89370000-0x00007FFD89380000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4080-147-0x0000000000000000-mapping.dmp

                                                                • memory/4128-241-0x0000000000000000-mapping.dmp

                                                                • memory/4168-160-0x0000000000000000-mapping.dmp

                                                                • memory/4184-255-0x0000000000000000-mapping.dmp

                                                                • memory/4304-261-0x0000000000000000-mapping.dmp

                                                                • memory/4308-180-0x0000000000000000-mapping.dmp

                                                                • memory/4432-248-0x0000000000000000-mapping.dmp

                                                                • memory/4588-263-0x0000000000000000-mapping.dmp

                                                                • memory/4636-249-0x0000000000000000-mapping.dmp

                                                                • memory/4644-262-0x0000000000000000-mapping.dmp

                                                                • memory/4688-222-0x0000000000000000-mapping.dmp

                                                                • memory/4764-252-0x0000000000000000-mapping.dmp

                                                                • memory/4816-235-0x0000000000000000-mapping.dmp

                                                                • memory/4840-239-0x0000000000000000-mapping.dmp

                                                                • memory/5048-136-0x0000000000000000-mapping.dmp

                                                                • memory/5072-135-0x0000000000000000-mapping.dmp