Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2022 14:29
Static task
static1
Behavioral task
behavioral1
Sample
4d9abf7905ad423200a067568f45a2e6.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
4d9abf7905ad423200a067568f45a2e6.exe
Resource
win10v2004-20220721-en
General
-
Target
4d9abf7905ad423200a067568f45a2e6.exe
-
Size
2.4MB
-
MD5
4d9abf7905ad423200a067568f45a2e6
-
SHA1
a19937f1b03ccd9575478369a5666c04080241dd
-
SHA256
972b7053006775f8a9144e8be644443c2750ac2737978c7d975d675c9e23d8de
-
SHA512
10db66702b4c8fd375957cda8b9657bf9a5bd184c9b9b232b6e2ade62d841dd9fcac91cb1d88819ef23b6b680f946a72951a6099d9718e72e1993059b5994ba7
Malware Config
Extracted
redline
nam3
103.89.90.61:18728
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Extracted
redline
4
31.41.244.134:11643
-
auth_value
a516b2d034ecd34338f12b50347fbd92
Extracted
raccoon
afb5c633c4650f69312baef49db9dfa4
http://77.73.132.84
Extracted
raccoon
f0c8034c83808635df0d9d8726d1bfd6
http://45.95.11.158/
Signatures
-
Raccoon Stealer payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/5924-236-0x0000000000400000-0x00000000004B5000-memory.dmp family_raccoon behavioral2/memory/5924-233-0x00000000007D0000-0x00000000007E6000-memory.dmp family_raccoon behavioral2/memory/5580-272-0x00000000001E0000-0x00000000001EF000-memory.dmp family_raccoon behavioral2/memory/5580-273-0x0000000000400000-0x000000000062B000-memory.dmp family_raccoon behavioral2/memory/5924-275-0x0000000000400000-0x00000000004B5000-memory.dmp family_raccoon behavioral2/memory/5924-276-0x0000000000400000-0x00000000004B5000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 9 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline behavioral2/memory/6084-214-0x0000000000DA0000-0x0000000000DE4000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline behavioral2/memory/5964-226-0x0000000000BF0000-0x0000000000C10000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline behavioral2/memory/2380-220-0x00000000001E0000-0x0000000000224000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
F0geI.exekukurzka9000.exenamdoitntn.exereal.exesafert44.exetag.exeEU1.exepid process 5580 F0geI.exe 5924 kukurzka9000.exe 6084 namdoitntn.exe 4512 real.exe 2380 safert44.exe 5964 tag.exe 6096 EU1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4d9abf7905ad423200a067568f45a2e6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation 4d9abf7905ad423200a067568f45a2e6.exe -
Loads dropped DLL 3 IoCs
Processes:
kukurzka9000.exepid process 5924 kukurzka9000.exe 5924 kukurzka9000.exe 5924 kukurzka9000.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 12 IoCs
Processes:
4d9abf7905ad423200a067568f45a2e6.exesetup.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe 4d9abf7905ad423200a067568f45a2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\tag.exe 4d9abf7905ad423200a067568f45a2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cryptoleek.exe 4d9abf7905ad423200a067568f45a2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jshainx.exe 4d9abf7905ad423200a067568f45a2e6.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220730142941.pma setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe 4d9abf7905ad423200a067568f45a2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe 4d9abf7905ad423200a067568f45a2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\WW1.exe 4d9abf7905ad423200a067568f45a2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\EU1.exe 4d9abf7905ad423200a067568f45a2e6.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\c8c665f4-e52f-478b-a684-41495ae8d49b.tmp setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe 4d9abf7905ad423200a067568f45a2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe 4d9abf7905ad423200a067568f45a2e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6596 5580 WerFault.exe F0geI.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exereal.exesafert44.exetag.exeidentity_helper.exenamdoitntn.exemsedge.exepid process 2032 msedge.exe 2032 msedge.exe 3668 msedge.exe 3668 msedge.exe 2024 msedge.exe 2024 msedge.exe 960 msedge.exe 960 msedge.exe 4628 msedge.exe 4628 msedge.exe 4708 msedge.exe 4708 msedge.exe 4512 real.exe 4512 real.exe 2380 safert44.exe 2380 safert44.exe 5964 tag.exe 5964 tag.exe 6376 identity_helper.exe 6376 identity_helper.exe 6084 namdoitntn.exe 6084 namdoitntn.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe 6392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
Processes:
msedge.exepid process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
safert44.exetag.exenamdoitntn.exedescription pid process Token: SeDebugPrivilege 2380 safert44.exe Token: SeDebugPrivilege 5964 tag.exe Token: SeDebugPrivilege 6084 namdoitntn.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid process 4628 msedge.exe 4628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4d9abf7905ad423200a067568f45a2e6.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exedescription pid process target process PID 4736 wrote to memory of 4212 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4736 wrote to memory of 4212 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4736 wrote to memory of 624 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4736 wrote to memory of 624 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4736 wrote to memory of 4628 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4736 wrote to memory of 4628 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4736 wrote to memory of 4976 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4736 wrote to memory of 4976 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4976 wrote to memory of 1328 4976 msedge.exe msedge.exe PID 4976 wrote to memory of 1328 4976 msedge.exe msedge.exe PID 624 wrote to memory of 2008 624 msedge.exe msedge.exe PID 624 wrote to memory of 2008 624 msedge.exe msedge.exe PID 4628 wrote to memory of 1556 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1556 4628 msedge.exe msedge.exe PID 4212 wrote to memory of 4396 4212 msedge.exe msedge.exe PID 4212 wrote to memory of 4396 4212 msedge.exe msedge.exe PID 4736 wrote to memory of 3452 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4736 wrote to memory of 3452 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 3452 wrote to memory of 228 3452 msedge.exe msedge.exe PID 3452 wrote to memory of 228 3452 msedge.exe msedge.exe PID 4736 wrote to memory of 2136 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 4736 wrote to memory of 2136 4736 4d9abf7905ad423200a067568f45a2e6.exe msedge.exe PID 2136 wrote to memory of 2036 2136 msedge.exe msedge.exe PID 2136 wrote to memory of 2036 2136 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe PID 4628 wrote to memory of 1596 4628 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d9abf7905ad423200a067568f45a2e6.exe"C:\Users\Admin\AppData\Local\Temp\4d9abf7905ad423200a067568f45a2e6.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1A3PL42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff09e446f8,0x7fff09e44708,0x7fff09e447183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7408194635965397639,3209520293441640352,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1n7LH42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0x9c,0x104,0x7fff09e446f8,0x7fff09e44708,0x7fff09e447183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,1640156372087073921,5169155372013869336,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,1640156372087073921,5169155372013869336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RLtX42⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff09e446f8,0x7fff09e44708,0x7fff09e447183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5488 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5048 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x280,0x284,0x288,0x25c,0x28c,0x7ff732415460,0x7ff732415470,0x7ff7324154804⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6280 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6280 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6688 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6936 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6940 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6928 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6916 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6956 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6932 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5192 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1924 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2388 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2424 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6136 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1980,896552601227146822,16011362146592497804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1460 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RyjC42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff09e446f8,0x7fff09e44708,0x7fff09e447183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6255682835912412482,11905085323873395443,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,6255682835912412482,11905085323873395443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RCgX42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff09e446f8,0x7fff09e44708,0x7fff09e447183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15672406139868091834,14914753264149677470,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15672406139868091834,14914753264149677470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1A4aK42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff09e446f8,0x7fff09e44708,0x7fff09e447183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RfaV42⤵
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 5523⤵
- Program crash
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\tag.exe"C:\Program Files (x86)\Company\NewProduct\tag.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\EU1.exe"C:\Program Files (x86)\Company\NewProduct\EU1.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff09e446f8,0x7fff09e44708,0x7fff09e447181⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5580 -ip 55801⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
289KB
MD561f51370de492e1b8fd565c68aa3141d
SHA189da629358f5e7fd4da717a15fd72b74869af631
SHA25619338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355
SHA5128aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200
-
C:\Program Files (x86)\Company\NewProduct\EU1.exeFilesize
289KB
MD561f51370de492e1b8fd565c68aa3141d
SHA189da629358f5e7fd4da717a15fd72b74869af631
SHA25619338864f06ba621eb3543d3a00ca4297d140e270a7ed1af174b61449a128355
SHA5128aaed5770ee595c458f6e25e1ad40ff482e4b1343dd1a8b289f69b88236afc209c1f63094c95f2522728f7a5460b3de4f76938d69e03b5432316dbbf9c35e200
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
178KB
MD58d24da259cd54db3ede2745724dbedab
SHA196f51cc49e1a6989dea96f382f2a958f488662a9
SHA25642f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883
SHA512ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
178KB
MD58d24da259cd54db3ede2745724dbedab
SHA196f51cc49e1a6989dea96f382f2a958f488662a9
SHA25642f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883
SHA512ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
699KB
MD5591fe3c4a7613d32309af09848c88233
SHA18170fce4ede2b4769fad1bec999db5d6a138fbb1
SHA2569f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d
SHA512e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
699KB
MD5591fe3c4a7613d32309af09848c88233
SHA18170fce4ede2b4769fad1bec999db5d6a138fbb1
SHA2569f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d
SHA512e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD5c334f2f742fc8f7c13dfa2a01da3f46a
SHA1d020819927da87bc5499df52e12dc5211a09ef61
SHA25692e9d7c3e28e78b7702d1de113e7b1ffbd6fe1447159e1982e0158aafe5e75cb
SHA51243deb443af74f5086d58d7d79af0407c2c6ef94ed338dfd2311dd595388143929a1ad8550b60d30a54e13207a3c95fa26be6fad773f191a56ca845c1055b5156
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD5c334f2f742fc8f7c13dfa2a01da3f46a
SHA1d020819927da87bc5499df52e12dc5211a09ef61
SHA25692e9d7c3e28e78b7702d1de113e7b1ffbd6fe1447159e1982e0158aafe5e75cb
SHA51243deb443af74f5086d58d7d79af0407c2c6ef94ed338dfd2311dd595388143929a1ad8550b60d30a54e13207a3c95fa26be6fad773f191a56ca845c1055b5156
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53Filesize
471B
MD59da5b5ff782c587a956f4b024e2a78ef
SHA114e215d8db03df26feb33b946a4bf348d9e91b1b
SHA2568533330cc1d5a026ecde0f833362b13e17a24339ec091610ea555e9a0727265d
SHA5127b07727fbf99f9adb8f4a04652f2938c52d60942136e979888f3fbc3611660eafbfe66e177ea40abcdc808848f63b58f6ec417af3d8a86fddbf04603792fc421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53Filesize
442B
MD59408858af9c98d9d64feaa8bd4dbea7a
SHA1651ce72bf8bfa052c5cbcebfdc51aba234bc07cf
SHA256d53ffb38099091ae9e910261e7e600b6b853be3b619df0db71a174c32f53c1fa
SHA512d48c3b27c50226019f842903ced359639b0d55eae22c6710f0738e900b2aed0f4e0709020102f3b74d2383ba5fc0129ceb8ff3597fc58b9991a35bce9da00b16
-
C:\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD597d70a58e490861249ab6a00e5d6147f
SHA13fd43941fa6009c0422cb9f6e9fa93008692318c
SHA2566ca9a20848c9cc748cb947f724965eb2181e1c0c541b00959a5fdcfbdb2eb36a
SHA51277ce9f54a2177331d54116024a47d3e863638597b9b0345eb2d241a2952332f69ad18a0d2b6be2d5cb8a84524f33c9ec78723bbd66ffa128850cc0a239c05404
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD597d70a58e490861249ab6a00e5d6147f
SHA13fd43941fa6009c0422cb9f6e9fa93008692318c
SHA2566ca9a20848c9cc748cb947f724965eb2181e1c0c541b00959a5fdcfbdb2eb36a
SHA51277ce9f54a2177331d54116024a47d3e863638597b9b0345eb2d241a2952332f69ad18a0d2b6be2d5cb8a84524f33c9ec78723bbd66ffa128850cc0a239c05404
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD597d70a58e490861249ab6a00e5d6147f
SHA13fd43941fa6009c0422cb9f6e9fa93008692318c
SHA2566ca9a20848c9cc748cb947f724965eb2181e1c0c541b00959a5fdcfbdb2eb36a
SHA51277ce9f54a2177331d54116024a47d3e863638597b9b0345eb2d241a2952332f69ad18a0d2b6be2d5cb8a84524f33c9ec78723bbd66ffa128850cc0a239c05404
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD597d70a58e490861249ab6a00e5d6147f
SHA13fd43941fa6009c0422cb9f6e9fa93008692318c
SHA2566ca9a20848c9cc748cb947f724965eb2181e1c0c541b00959a5fdcfbdb2eb36a
SHA51277ce9f54a2177331d54116024a47d3e863638597b9b0345eb2d241a2952332f69ad18a0d2b6be2d5cb8a84524f33c9ec78723bbd66ffa128850cc0a239c05404
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD597d70a58e490861249ab6a00e5d6147f
SHA13fd43941fa6009c0422cb9f6e9fa93008692318c
SHA2566ca9a20848c9cc748cb947f724965eb2181e1c0c541b00959a5fdcfbdb2eb36a
SHA51277ce9f54a2177331d54116024a47d3e863638597b9b0345eb2d241a2952332f69ad18a0d2b6be2d5cb8a84524f33c9ec78723bbd66ffa128850cc0a239c05404
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD597d70a58e490861249ab6a00e5d6147f
SHA13fd43941fa6009c0422cb9f6e9fa93008692318c
SHA2566ca9a20848c9cc748cb947f724965eb2181e1c0c541b00959a5fdcfbdb2eb36a
SHA51277ce9f54a2177331d54116024a47d3e863638597b9b0345eb2d241a2952332f69ad18a0d2b6be2d5cb8a84524f33c9ec78723bbd66ffa128850cc0a239c05404
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD597d70a58e490861249ab6a00e5d6147f
SHA13fd43941fa6009c0422cb9f6e9fa93008692318c
SHA2566ca9a20848c9cc748cb947f724965eb2181e1c0c541b00959a5fdcfbdb2eb36a
SHA51277ce9f54a2177331d54116024a47d3e863638597b9b0345eb2d241a2952332f69ad18a0d2b6be2d5cb8a84524f33c9ec78723bbd66ffa128850cc0a239c05404
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59ea6ce631f0dbc87fe530c4269861cca
SHA10836ec64123dacff7c804da0c6b413b358cb2986
SHA256582a006caf5be200f4e74d18b5389bc447bea186f3f7d0ff3a436f2dbb9d44c8
SHA51245b2eede98b7950f1296f09382dc004d71b5254ff634b6a70ded2de5915a26519f50db513d20c77359294aff423699bf602c308b1f917f1e822f2066cab1295e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59ea6ce631f0dbc87fe530c4269861cca
SHA10836ec64123dacff7c804da0c6b413b358cb2986
SHA256582a006caf5be200f4e74d18b5389bc447bea186f3f7d0ff3a436f2dbb9d44c8
SHA51245b2eede98b7950f1296f09382dc004d71b5254ff634b6a70ded2de5915a26519f50db513d20c77359294aff423699bf602c308b1f917f1e822f2066cab1295e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59ea6ce631f0dbc87fe530c4269861cca
SHA10836ec64123dacff7c804da0c6b413b358cb2986
SHA256582a006caf5be200f4e74d18b5389bc447bea186f3f7d0ff3a436f2dbb9d44c8
SHA51245b2eede98b7950f1296f09382dc004d71b5254ff634b6a70ded2de5915a26519f50db513d20c77359294aff423699bf602c308b1f917f1e822f2066cab1295e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59ea6ce631f0dbc87fe530c4269861cca
SHA10836ec64123dacff7c804da0c6b413b358cb2986
SHA256582a006caf5be200f4e74d18b5389bc447bea186f3f7d0ff3a436f2dbb9d44c8
SHA51245b2eede98b7950f1296f09382dc004d71b5254ff634b6a70ded2de5915a26519f50db513d20c77359294aff423699bf602c308b1f917f1e822f2066cab1295e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59ea6ce631f0dbc87fe530c4269861cca
SHA10836ec64123dacff7c804da0c6b413b358cb2986
SHA256582a006caf5be200f4e74d18b5389bc447bea186f3f7d0ff3a436f2dbb9d44c8
SHA51245b2eede98b7950f1296f09382dc004d71b5254ff634b6a70ded2de5915a26519f50db513d20c77359294aff423699bf602c308b1f917f1e822f2066cab1295e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59ea6ce631f0dbc87fe530c4269861cca
SHA10836ec64123dacff7c804da0c6b413b358cb2986
SHA256582a006caf5be200f4e74d18b5389bc447bea186f3f7d0ff3a436f2dbb9d44c8
SHA51245b2eede98b7950f1296f09382dc004d71b5254ff634b6a70ded2de5915a26519f50db513d20c77359294aff423699bf602c308b1f917f1e822f2066cab1295e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59ea6ce631f0dbc87fe530c4269861cca
SHA10836ec64123dacff7c804da0c6b413b358cb2986
SHA256582a006caf5be200f4e74d18b5389bc447bea186f3f7d0ff3a436f2dbb9d44c8
SHA51245b2eede98b7950f1296f09382dc004d71b5254ff634b6a70ded2de5915a26519f50db513d20c77359294aff423699bf602c308b1f917f1e822f2066cab1295e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59ea6ce631f0dbc87fe530c4269861cca
SHA10836ec64123dacff7c804da0c6b413b358cb2986
SHA256582a006caf5be200f4e74d18b5389bc447bea186f3f7d0ff3a436f2dbb9d44c8
SHA51245b2eede98b7950f1296f09382dc004d71b5254ff634b6a70ded2de5915a26519f50db513d20c77359294aff423699bf602c308b1f917f1e822f2066cab1295e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a7134c5f7a65d606c63a36922e587450
SHA1c7aebb450811d36a3c31d504e545edcbde2c67ac
SHA256d28f17c59dbd744081992eadfddc16c8539bd04ecc1fd7499397fab24380beee
SHA512f6748400e89255259ab0979af56457b8449b846228386b035068b0d6d3e374652d0e33f0d33aa8c49aca739a9fa03a30583a6886e869aa919607e7da9bd36177
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\CookiesFilesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web DataFilesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD51e6fb8e7c6b70cf4cea432f3d6d4be7b
SHA11d161638aeb72f04faaa88b9eeba605f1c5d12c1
SHA2565116473e903774f4cb21f0fa72a793245a0e07f57d40ebc8c23cdbbb6e8c1111
SHA5125cb84d856003d844da94c9d35c101116bbfc69dc06500aaaa38c29d29d63551585c605e2e6ff9a6d5236c8864b1af37c53dcd2064644918002860296d5d6c1f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD53847f17b4647545d952b6d47d3ed37cb
SHA120aa20edc3be5c144fdd6b569b311ed5029f2b38
SHA256ed5caa56a3e41949901a7b3a84a2c12639ea5a931077fcd3e8641a53bb7333fb
SHA51244880fc0611355dc97f733673615be4b23f86be796e67758b8bef554d6ac5c10b2e4bc54a4be8269cbd8925a97c0c689feb4857279c625be6841b9b2d181cf2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD51e6fb8e7c6b70cf4cea432f3d6d4be7b
SHA11d161638aeb72f04faaa88b9eeba605f1c5d12c1
SHA2565116473e903774f4cb21f0fa72a793245a0e07f57d40ebc8c23cdbbb6e8c1111
SHA5125cb84d856003d844da94c9d35c101116bbfc69dc06500aaaa38c29d29d63551585c605e2e6ff9a6d5236c8864b1af37c53dcd2064644918002860296d5d6c1f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD56b98944aa05cb5af183402a6f404dd8e
SHA1fe9114e79f1a7c6eabfe72c6b4a759b83ab70420
SHA256ac411f9596cae1df0b17ecfdec175c2dc0b5cd003b710dd78cd5119e211d7688
SHA5127b19101574ae02a3bb324da59bbbcdc274df9f71bc0d7ca97cacc9157af2586ddccc19a2ca0ebc044b96072bc977ee88afb7f2c365e802a28b39d8512f55db23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD53847f17b4647545d952b6d47d3ed37cb
SHA120aa20edc3be5c144fdd6b569b311ed5029f2b38
SHA256ed5caa56a3e41949901a7b3a84a2c12639ea5a931077fcd3e8641a53bb7333fb
SHA51244880fc0611355dc97f733673615be4b23f86be796e67758b8bef554d6ac5c10b2e4bc54a4be8269cbd8925a97c0c689feb4857279c625be6841b9b2d181cf2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
9KB
MD51603f102caaa7ec6904c37aad8d2bcf2
SHA1ea11db3c33e59344a6e10c312a1cb3afda4604aa
SHA2566c2dbc8ea01721a3a87ed7b20dbd4244cecf530c63d34125345a5dfd51ca9290
SHA512168bc38ff5c8f88ee0e612197e53c6015198d341f1a9fa84c7786177f9b262a5a06a1b8cbc79d0911fb77d93a3473fa7adc1372673384b529b6d0f3b543d87ec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5a54c175d5a49b8a358285f020ba48a78
SHA1cf8dc19367005ad538431e3df8a1816de8ca9c7a
SHA2568086b81291c52f40c504f379f460a4ae8912ef766c4ede472140ace052b5c4f2
SHA512d589448e2ab7f9e9124d9822f91f8b2dbac42e6d77ce87f8ba88e856700cab75908c40c68f8a5cd4cd53c0482b7723bbe48f1b54f7348f01782f4d635a667a39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5a54c175d5a49b8a358285f020ba48a78
SHA1cf8dc19367005ad538431e3df8a1816de8ca9c7a
SHA2568086b81291c52f40c504f379f460a4ae8912ef766c4ede472140ace052b5c4f2
SHA512d589448e2ab7f9e9124d9822f91f8b2dbac42e6d77ce87f8ba88e856700cab75908c40c68f8a5cd4cd53c0482b7723bbe48f1b54f7348f01782f4d635a667a39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD56b98944aa05cb5af183402a6f404dd8e
SHA1fe9114e79f1a7c6eabfe72c6b4a759b83ab70420
SHA256ac411f9596cae1df0b17ecfdec175c2dc0b5cd003b710dd78cd5119e211d7688
SHA5127b19101574ae02a3bb324da59bbbcdc274df9f71bc0d7ca97cacc9157af2586ddccc19a2ca0ebc044b96072bc977ee88afb7f2c365e802a28b39d8512f55db23
-
\??\pipe\LOCAL\crashpad_3452_ECWWPTWSIKHPGCWTMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_4628_LJFWRGBXDFRSGWRYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_4976_UKGMWUBTYUYIPBFYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_624_JOZUJIAWHFLUIXKVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/228-139-0x0000000000000000-mapping.dmp
-
memory/624-131-0x0000000000000000-mapping.dmp
-
memory/960-177-0x0000000000000000-mapping.dmp
-
memory/1328-134-0x0000000000000000-mapping.dmp
-
memory/1524-176-0x0000000000000000-mapping.dmp
-
memory/1556-136-0x0000000000000000-mapping.dmp
-
memory/1596-153-0x0000000000000000-mapping.dmp
-
memory/1972-300-0x0000000000000000-mapping.dmp
-
memory/2008-135-0x0000000000000000-mapping.dmp
-
memory/2024-166-0x0000000000000000-mapping.dmp
-
memory/2032-154-0x0000000000000000-mapping.dmp
-
memory/2036-148-0x0000000000000000-mapping.dmp
-
memory/2136-147-0x0000000000000000-mapping.dmp
-
memory/2144-313-0x0000000000000000-mapping.dmp
-
memory/2192-165-0x0000000000000000-mapping.dmp
-
memory/2264-182-0x0000000000000000-mapping.dmp
-
memory/2280-302-0x0000000000000000-mapping.dmp
-
memory/2328-178-0x0000000000000000-mapping.dmp
-
memory/2380-267-0x0000000004F30000-0x0000000004FA6000-memory.dmpFilesize
472KB
-
memory/2380-220-0x00000000001E0000-0x0000000000224000-memory.dmpFilesize
272KB
-
memory/2380-278-0x00000000083A0000-0x00000000088CC000-memory.dmpFilesize
5.2MB
-
memory/2380-215-0x0000000000000000-mapping.dmp
-
memory/2380-271-0x00000000061D0000-0x0000000006774000-memory.dmpFilesize
5.6MB
-
memory/2380-232-0x0000000004BA0000-0x0000000004BB2000-memory.dmpFilesize
72KB
-
memory/2448-170-0x0000000000000000-mapping.dmp
-
memory/3016-311-0x0000000000000000-mapping.dmp
-
memory/3216-158-0x0000000000000000-mapping.dmp
-
memory/3220-160-0x0000000000000000-mapping.dmp
-
memory/3452-138-0x0000000000000000-mapping.dmp
-
memory/3668-163-0x0000000000000000-mapping.dmp
-
memory/4212-130-0x0000000000000000-mapping.dmp
-
memory/4396-137-0x0000000000000000-mapping.dmp
-
memory/4512-235-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/4512-211-0x0000000000000000-mapping.dmp
-
memory/4628-132-0x0000000000000000-mapping.dmp
-
memory/4708-179-0x0000000000000000-mapping.dmp
-
memory/4852-171-0x0000000000000000-mapping.dmp
-
memory/4976-133-0x0000000000000000-mapping.dmp
-
memory/5240-296-0x0000000000000000-mapping.dmp
-
memory/5336-282-0x0000000000000000-mapping.dmp
-
memory/5368-294-0x0000000000000000-mapping.dmp
-
memory/5476-292-0x0000000000000000-mapping.dmp
-
memory/5512-306-0x0000000000000000-mapping.dmp
-
memory/5536-290-0x0000000000000000-mapping.dmp
-
memory/5564-187-0x0000000000000000-mapping.dmp
-
memory/5580-270-0x0000000000863000-0x0000000000874000-memory.dmpFilesize
68KB
-
memory/5580-273-0x0000000000400000-0x000000000062B000-memory.dmpFilesize
2.2MB
-
memory/5580-272-0x00000000001E0000-0x00000000001EF000-memory.dmpFilesize
60KB
-
memory/5580-188-0x0000000000000000-mapping.dmp
-
memory/5604-192-0x0000000000000000-mapping.dmp
-
memory/5700-194-0x0000000000000000-mapping.dmp
-
memory/5812-298-0x0000000000000000-mapping.dmp
-
memory/5824-248-0x0000000000000000-mapping.dmp
-
memory/5848-197-0x0000000000000000-mapping.dmp
-
memory/5924-236-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/5924-196-0x0000000000000000-mapping.dmp
-
memory/5924-276-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/5924-275-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/5924-233-0x00000000007D0000-0x00000000007E6000-memory.dmpFilesize
88KB
-
memory/5932-221-0x0000000000000000-mapping.dmp
-
memory/5964-231-0x00000000059A0000-0x0000000005FB8000-memory.dmpFilesize
6.1MB
-
memory/5964-277-0x0000000006F80000-0x0000000007142000-memory.dmpFilesize
1.8MB
-
memory/5964-226-0x0000000000BF0000-0x0000000000C10000-memory.dmpFilesize
128KB
-
memory/5964-274-0x0000000006200000-0x000000000621E000-memory.dmpFilesize
120KB
-
memory/5964-268-0x0000000005900000-0x0000000005992000-memory.dmpFilesize
584KB
-
memory/5964-222-0x0000000000000000-mapping.dmp
-
memory/5964-234-0x0000000005570000-0x000000000567A000-memory.dmpFilesize
1.0MB
-
memory/5968-288-0x0000000000000000-mapping.dmp
-
memory/6052-202-0x0000000000000000-mapping.dmp
-
memory/6076-244-0x0000000000000000-mapping.dmp
-
memory/6084-239-0x00000000064F0000-0x000000000652C000-memory.dmpFilesize
240KB
-
memory/6084-203-0x0000000000000000-mapping.dmp
-
memory/6084-214-0x0000000000DA0000-0x0000000000DE4000-memory.dmpFilesize
272KB
-
memory/6084-279-0x0000000008DB0000-0x0000000008E00000-memory.dmpFilesize
320KB
-
memory/6084-269-0x0000000007680000-0x00000000076E6000-memory.dmpFilesize
408KB
-
memory/6096-223-0x0000000000000000-mapping.dmp
-
memory/6108-210-0x0000000000000000-mapping.dmp
-
memory/6220-252-0x0000000000000000-mapping.dmp
-
memory/6304-304-0x0000000000000000-mapping.dmp
-
memory/6376-280-0x0000000000000000-mapping.dmp
-
memory/6392-309-0x0000000000000000-mapping.dmp
-
memory/6500-284-0x0000000000000000-mapping.dmp
-
memory/6532-308-0x0000000000000000-mapping.dmp
-
memory/6592-286-0x0000000000000000-mapping.dmp
-
memory/7088-301-0x0000000000000000-mapping.dmp