Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 22:06
Static task
static1
Behavioral task
behavioral1
Sample
a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe
Resource
win10v2004-20220721-en
General
-
Target
a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe
-
Size
1.2MB
-
MD5
5a01e03552bab4e5a884717a456d4f2e
-
SHA1
fcbe9c06e57e8912123fbe4bf7cc1cabbf0ee116
-
SHA256
a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e677e003d3adf74f4e9ec
-
SHA512
9d659d4959281955c2741cd31b6c79235f40df0a2df0256cfc620b2a716e0eb6328b4a2774a3c12df2044e176ea04bd7f43b55e885a576796130baf55690e8aa
Malware Config
Extracted
redline
nam3
103.89.90.61:18728
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
4
31.41.244.134:11643
-
auth_value
a516b2d034ecd34338f12b50347fbd92
Extracted
redline
alex
185.106.92.128:16509
-
auth_value
4f79d5b8f5aae9e19c9693489b4872c0
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Extracted
redline
185.215.113.46:8223
-
auth_value
1c36b510dbc8ee0265942899b008d972
Extracted
raccoon
afb5c633c4650f69312baef49db9dfa4
http://77.73.132.84
Extracted
privateloader
http://163.123.143.4/proxies.txt
http://193.233.177.215/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
163.123.143.12
Extracted
raccoon
f0c8034c83808635df0d9d8726d1bfd6
http://45.95.11.158/
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Raccoon Stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2484-211-0x0000000002190000-0x00000000021A6000-memory.dmp family_raccoon behavioral2/memory/2484-218-0x0000000000400000-0x00000000004B5000-memory.dmp family_raccoon behavioral2/memory/3968-295-0x00000000001E0000-0x00000000001EF000-memory.dmp family_raccoon behavioral2/memory/3968-296-0x0000000000400000-0x000000000062B000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 15 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline behavioral2/memory/320-161-0x0000000000C10000-0x0000000000C30000-memory.dmp family_redline behavioral2/memory/4032-162-0x0000000000C50000-0x0000000000C94000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline behavioral2/memory/3428-160-0x0000000000620000-0x0000000000664000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\Roman_12020.exe family_redline C:\Program Files (x86)\Company\NewProduct\Roman_12020.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline behavioral2/memory/2244-165-0x0000000000760000-0x0000000000780000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\HappyRoot.exe family_redline behavioral2/memory/4020-194-0x0000000000A40000-0x0000000000A60000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\HappyRoot.exe family_redline -
Executes dropped EXE 10 IoCs
Processes:
namdoitntn.exereal.exeRoman_12020.exesafert44.exetag.exekukurzka9000.exeF0geI.exeg3rgg.exeWW1.exeHappyRoot.exepid process 3428 namdoitntn.exe 3412 real.exe 320 Roman_12020.exe 4032 safert44.exe 2244 tag.exe 2484 kukurzka9000.exe 3968 F0geI.exe 5012 g3rgg.exe 3208 WW1.exe 4020 HappyRoot.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 12 IoCs
Processes:
a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exesetup.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\HappyRoot.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\dc0d1fe4-876d-4bb1-a34c-8911caa61bfb.tmp setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\tag.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\g3rgg.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\WW1.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220802000708.pma setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Roman_12020.exe a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5360 3968 WerFault.exe F0geI.exe 3608 5012 WerFault.exe g3rgg.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exereal.exesafert44.exetag.exeRoman_12020.exenamdoitntn.exeHappyRoot.exeidentity_helper.exemsedge.exepid process 5220 msedge.exe 5220 msedge.exe 5356 msedge.exe 5356 msedge.exe 5300 msedge.exe 5300 msedge.exe 5264 msedge.exe 5264 msedge.exe 5432 msedge.exe 5432 msedge.exe 5344 msedge.exe 5344 msedge.exe 3240 msedge.exe 3240 msedge.exe 3412 real.exe 3412 real.exe 4032 safert44.exe 4032 safert44.exe 2244 tag.exe 2244 tag.exe 320 Roman_12020.exe 320 Roman_12020.exe 3428 namdoitntn.exe 3428 namdoitntn.exe 4020 HappyRoot.exe 4020 HappyRoot.exe 5164 identity_helper.exe 5164 identity_helper.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
safert44.exetag.exeRoman_12020.exenamdoitntn.exeHappyRoot.exedescription pid process Token: SeDebugPrivilege 4032 safert44.exe Token: SeDebugPrivilege 2244 tag.exe Token: SeDebugPrivilege 320 Roman_12020.exe Token: SeDebugPrivilege 3428 namdoitntn.exe Token: SeDebugPrivilege 4020 HappyRoot.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exedescription pid process target process PID 1340 wrote to memory of 4944 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 1340 wrote to memory of 4944 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 1340 wrote to memory of 4648 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 1340 wrote to memory of 4648 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 4648 wrote to memory of 4568 4648 msedge.exe msedge.exe PID 4648 wrote to memory of 4568 4648 msedge.exe msedge.exe PID 4944 wrote to memory of 4536 4944 msedge.exe msedge.exe PID 4944 wrote to memory of 4536 4944 msedge.exe msedge.exe PID 1340 wrote to memory of 5068 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 1340 wrote to memory of 5068 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 5068 wrote to memory of 3236 5068 msedge.exe msedge.exe PID 5068 wrote to memory of 3236 5068 msedge.exe msedge.exe PID 1340 wrote to memory of 3240 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 1340 wrote to memory of 3240 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 3240 wrote to memory of 3308 3240 msedge.exe msedge.exe PID 3240 wrote to memory of 3308 3240 msedge.exe msedge.exe PID 1340 wrote to memory of 3112 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 1340 wrote to memory of 3112 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 3112 wrote to memory of 1528 3112 msedge.exe msedge.exe PID 3112 wrote to memory of 1528 3112 msedge.exe msedge.exe PID 1340 wrote to memory of 3836 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 1340 wrote to memory of 3836 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 3836 wrote to memory of 1472 3836 msedge.exe msedge.exe PID 3836 wrote to memory of 1472 3836 msedge.exe msedge.exe PID 1340 wrote to memory of 3428 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe namdoitntn.exe PID 1340 wrote to memory of 3428 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe namdoitntn.exe PID 1340 wrote to memory of 3428 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe namdoitntn.exe PID 1340 wrote to memory of 3412 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe real.exe PID 1340 wrote to memory of 3412 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe real.exe PID 1340 wrote to memory of 3412 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe real.exe PID 1340 wrote to memory of 320 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe Roman_12020.exe PID 1340 wrote to memory of 320 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe Roman_12020.exe PID 1340 wrote to memory of 320 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe Roman_12020.exe PID 1340 wrote to memory of 4032 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe safert44.exe PID 1340 wrote to memory of 4032 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe safert44.exe PID 1340 wrote to memory of 4032 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe safert44.exe PID 1340 wrote to memory of 2244 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe tag.exe PID 1340 wrote to memory of 2244 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe tag.exe PID 1340 wrote to memory of 2244 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe tag.exe PID 1340 wrote to memory of 2484 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe kukurzka9000.exe PID 1340 wrote to memory of 2484 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe kukurzka9000.exe PID 1340 wrote to memory of 2484 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe kukurzka9000.exe PID 1340 wrote to memory of 3968 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe F0geI.exe PID 1340 wrote to memory of 3968 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe F0geI.exe PID 1340 wrote to memory of 3968 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe F0geI.exe PID 1340 wrote to memory of 5012 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe g3rgg.exe PID 1340 wrote to memory of 5012 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe g3rgg.exe PID 1340 wrote to memory of 5012 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe g3rgg.exe PID 1340 wrote to memory of 3208 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe WW1.exe PID 1340 wrote to memory of 3208 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe WW1.exe PID 1340 wrote to memory of 3208 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe WW1.exe PID 1340 wrote to memory of 2888 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 1340 wrote to memory of 2888 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe msedge.exe PID 1340 wrote to memory of 4020 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe HappyRoot.exe PID 1340 wrote to memory of 4020 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe HappyRoot.exe PID 1340 wrote to memory of 4020 1340 a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe HappyRoot.exe PID 2888 wrote to memory of 4372 2888 msedge.exe msedge.exe PID 2888 wrote to memory of 4372 2888 msedge.exe msedge.exe PID 3240 wrote to memory of 224 3240 msedge.exe msedge.exe PID 3240 wrote to memory of 224 3240 msedge.exe msedge.exe PID 3240 wrote to memory of 224 3240 msedge.exe msedge.exe PID 3240 wrote to memory of 224 3240 msedge.exe msedge.exe PID 3240 wrote to memory of 224 3240 msedge.exe msedge.exe PID 3240 wrote to memory of 224 3240 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe"C:\Users\Admin\AppData\Local\Temp\a880ebe9be4e9888ac2faa331c390b5d477fc828bf2e6.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RyjC42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa8e5646f8,0x7ffa8e564708,0x7ffa8e5647183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,282880695997965866,9126339749650577326,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,282880695997965866,9126339749650577326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1A4aK42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0xd4,0x7ffa8e5646f8,0x7ffa8e564708,0x7ffa8e5647183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,1967950485925036552,3718258411529805004,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,1967950485925036552,3718258411529805004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RLtX42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa8e5646f8,0x7ffa8e564708,0x7ffa8e5647183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,15700108461131542496,5063224355054221552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,15700108461131542496,5063224355054221552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RCgX42⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8e5646f8,0x7ffa8e564708,0x7ffa8e5647183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4684 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6968 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6984 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x274,0x278,0x27c,0x250,0x280,0x7ff74a755460,0x7ff74a755470,0x7ff74a7554804⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5220 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5216 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,346651557750373333,10074797003252605976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8200 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1n7LH42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa8e5646f8,0x7ffa8e564708,0x7ffa8e5647183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6317691004678751892,5985798687493155702,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6317691004678751892,5985798687493155702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1nfDK42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa8e5646f8,0x7ffa8e564708,0x7ffa8e5647183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13757915913238883104,2206038822420170636,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13757915913238883104,2206038822420170636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Company\NewProduct\Roman_12020.exe"C:\Program Files (x86)\Company\NewProduct\Roman_12020.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\tag.exe"C:\Program Files (x86)\Company\NewProduct\tag.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\g3rgg.exe"C:\Program Files (x86)\Company\NewProduct\g3rgg.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 12203⤵
- Program crash
-
C:\Program Files (x86)\Company\NewProduct\WW1.exe"C:\Program Files (x86)\Company\NewProduct\WW1.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 5523⤵
- Program crash
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1nzwK42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0x9c,0x104,0x7ffa8e5646f8,0x7ffa8e564708,0x7ffa8e5647183⤵
-
C:\Program Files (x86)\Company\NewProduct\HappyRoot.exe"C:\Program Files (x86)\Company\NewProduct\HappyRoot.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1Ay2Z42⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa8e5646f8,0x7ffa8e564708,0x7ffa8e5647183⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3968 -ip 39681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5012 -ip 50121⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
178KB
MD58d24da259cd54db3ede2745724dbedab
SHA196f51cc49e1a6989dea96f382f2a958f488662a9
SHA25642f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883
SHA512ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
178KB
MD58d24da259cd54db3ede2745724dbedab
SHA196f51cc49e1a6989dea96f382f2a958f488662a9
SHA25642f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883
SHA512ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536
-
C:\Program Files (x86)\Company\NewProduct\HappyRoot.exeFilesize
107KB
MD50ad2faba47ab5f5933c240ece1ea7075
SHA16479bc7cedfc416856a700eda0d83bd5121b11f9
SHA25681cde4aac3ccad7227fa643504b0c7f26084951df6cb668671932079e13d923b
SHA51272011e4a5a0a90a79dcd2f8347afa2cf8dcd3f3feec2dbac8ab18941cd981f2f5aa730973d377f09f7b211b665be1974474d9e29ecabfba86cf12b3f188a3f32
-
C:\Program Files (x86)\Company\NewProduct\HappyRoot.exeFilesize
107KB
MD50ad2faba47ab5f5933c240ece1ea7075
SHA16479bc7cedfc416856a700eda0d83bd5121b11f9
SHA25681cde4aac3ccad7227fa643504b0c7f26084951df6cb668671932079e13d923b
SHA51272011e4a5a0a90a79dcd2f8347afa2cf8dcd3f3feec2dbac8ab18941cd981f2f5aa730973d377f09f7b211b665be1974474d9e29ecabfba86cf12b3f188a3f32
-
C:\Program Files (x86)\Company\NewProduct\Roman_12020.exeFilesize
107KB
MD5ba055c9213817647673b72f9ea898de9
SHA1e45a767b0fb77920d28198169f4e7d16809b9c9a
SHA256d2cb8ab16c0a8b29c99abab063775f3e0a115e5a4da9082064c7bc4a58cd6838
SHA5126fa57b1f0979aff2e746433c5c1ba3a7d8543c7938837b874b3c73f0520550d02f751c4c46b8c460e9672062d9b5c4e4d8a31d72fd2e448533986da2da7aacb9
-
C:\Program Files (x86)\Company\NewProduct\Roman_12020.exeFilesize
107KB
MD5ba055c9213817647673b72f9ea898de9
SHA1e45a767b0fb77920d28198169f4e7d16809b9c9a
SHA256d2cb8ab16c0a8b29c99abab063775f3e0a115e5a4da9082064c7bc4a58cd6838
SHA5126fa57b1f0979aff2e746433c5c1ba3a7d8543c7938837b874b3c73f0520550d02f751c4c46b8c460e9672062d9b5c4e4d8a31d72fd2e448533986da2da7aacb9
-
C:\Program Files (x86)\Company\NewProduct\WW1.exeFilesize
289KB
MD569750dea82ebe55964c730ad017a8e23
SHA1af6389d17bfd58dac6e0d392f15fca7fd4aea21e
SHA25685587806e1f2649bab0d9c1b9464a4e88ad65a224e3febfddbc22d4b19f63f25
SHA512bcdf5e2ddc678d7d292cdc0bfbd136fed700638e40df71ba96265309f6656c9157bb5d6b981ad33ddf6804aa9121ca00796931298e95f354696d9c891346d147
-
C:\Program Files (x86)\Company\NewProduct\WW1.exeFilesize
289KB
MD569750dea82ebe55964c730ad017a8e23
SHA1af6389d17bfd58dac6e0d392f15fca7fd4aea21e
SHA25685587806e1f2649bab0d9c1b9464a4e88ad65a224e3febfddbc22d4b19f63f25
SHA512bcdf5e2ddc678d7d292cdc0bfbd136fed700638e40df71ba96265309f6656c9157bb5d6b981ad33ddf6804aa9121ca00796931298e95f354696d9c891346d147
-
C:\Program Files (x86)\Company\NewProduct\g3rgg.exeFilesize
386KB
MD559be2ebcf6516dd07ee5df8eae402523
SHA1e4e5b949a0c9721e4c89f124750d8a97e4d96c7e
SHA256d2952be5c81f4135c0953b7b36677704f24f4d780de268ce6b67a44a6f15419a
SHA5129148e9a303a3562f9552da8fa6cdd3c1d4034be31d20968a8dc51904c0d4cf167c0cdfa0d6ceac0ec0a24a975b8c04de9a1d4d67f0056dce810ad4e5b83215d2
-
C:\Program Files (x86)\Company\NewProduct\g3rgg.exeFilesize
386KB
MD559be2ebcf6516dd07ee5df8eae402523
SHA1e4e5b949a0c9721e4c89f124750d8a97e4d96c7e
SHA256d2952be5c81f4135c0953b7b36677704f24f4d780de268ce6b67a44a6f15419a
SHA5129148e9a303a3562f9552da8fa6cdd3c1d4034be31d20968a8dc51904c0d4cf167c0cdfa0d6ceac0ec0a24a975b8c04de9a1d4d67f0056dce810ad4e5b83215d2
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
699KB
MD5591fe3c4a7613d32309af09848c88233
SHA18170fce4ede2b4769fad1bec999db5d6a138fbb1
SHA2569f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d
SHA512e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
699KB
MD5591fe3c4a7613d32309af09848c88233
SHA18170fce4ede2b4769fad1bec999db5d6a138fbb1
SHA2569f289f95453c588a9ff4bef57b59d6ec812e985b14fdae4554b7112e52819e9d
SHA512e1b3c7c3a807814a7a8139e7043053d12820bdd18c6e4d1320818f9f8b0e1c98a0786425c2d68ad7f789160f816eaa367402af5c67f2e204b9ec0831c1a04f6c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD584d016c5a9e810c2ef08767805a87589
SHA1750b15c9c1acdfcd1396ecec11ab109706a945ad
SHA2566e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845
SHA5127c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD584d016c5a9e810c2ef08767805a87589
SHA1750b15c9c1acdfcd1396ecec11ab109706a945ad
SHA2566e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845
SHA5127c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\CookiesFilesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web DataFilesize
112KB
MD530e375798049100677ea16b7c578a4ee
SHA1bcab7401a5f34ac0e6f795ece8d3ed12944ae99f
SHA256ea5c90cfc97f429a2f9e0b1e9b16778b5b19bd8e83a896a30002de70af84e1ce
SHA512f8ae930e26ecfe06dc30d4f39858b0eec6b4a81a8139883712505b5c6b58504d463d986ef58c7151a247fe157c6013b570b9d39e1d4a860061e37e0419900582
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD586fd881724d59e2118f1971eb1a67dd3
SHA13ee80d8f9cfacc7562700eabb61b5bba0772976b
SHA2563c742a049aff94e866ab3f5eb6f036cb4049b9287950da38c902b6a9776c80ba
SHA5121a0cbf18489c38ebf13f216ccfba2e31dd45b19566575e77652e4d8c4c9e3c55023c83728b38a25cd5cdba0f7e69fa8ad0b3b4c62e864579f37075862997690c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5bf6c32dc8f4fbafc54c30967ace8defa
SHA14a3d2a08d00585388ac465794dc9a7ebf9252871
SHA256dff89b3491e911e20e281041ee13c0cfe20c8acd27c55c3c18a899ad071bd805
SHA51297def21f544621771f905926502ac814acf234ac537ee6ba0e44efe33c56dd99d8c9f6f6c4d22de2d0a93b2bef3be464abf63538c82e9c82da69581f367871d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5f61379c62ced7a095dcebce479acc8bb
SHA15f42b183ec9da9bb493ef7c094f514a11505ea52
SHA256d27a7f4e1a3ac061e3b5a0cc78eb18be10c936f5a6172fb79646d9036cc40cbe
SHA5124eeb45b645ca3f124bfb0aa634962bb6f22b4d0afac21b1a611865a8e5086cdc9749233692e474f2eb75a0754794809447b016c179e2598bbc296b1016f64747
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5a711bf4aba2fb3b3bb60ede8db62394b
SHA132d791a823f28bb2c32ee6449db02c93b42a131b
SHA256800d249fe0092d005bcf8f225fe8c1ac8583c2f2f759fb5846e7ad690c6ef3de
SHA51207de53a4d84a9f15d12f7760869f406f00d9e388adcfdb86b1ff46f957226b9fbdb925baf31c156153162e3cb94382e2ab86a77b505605e73130d04bc4003f10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5a711bf4aba2fb3b3bb60ede8db62394b
SHA132d791a823f28bb2c32ee6449db02c93b42a131b
SHA256800d249fe0092d005bcf8f225fe8c1ac8583c2f2f759fb5846e7ad690c6ef3de
SHA51207de53a4d84a9f15d12f7760869f406f00d9e388adcfdb86b1ff46f957226b9fbdb925baf31c156153162e3cb94382e2ab86a77b505605e73130d04bc4003f10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD51a2964a27be39a81090498b301b87de9
SHA124ef987fa136d1c97423827a443b9ce5c64d6fa8
SHA256eff851d991143d3ddb1dab5fa08157951c807607f33419eb033b7efbbb33b953
SHA5124935580a96b30957bb246c140849501c1ffa854aec585c33b8adbc94ee62f48bfa3cff8ec242f2c51d05c01e787dc60a9db974c3bfd02f9c5b196ff317ea278b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD586fd881724d59e2118f1971eb1a67dd3
SHA13ee80d8f9cfacc7562700eabb61b5bba0772976b
SHA2563c742a049aff94e866ab3f5eb6f036cb4049b9287950da38c902b6a9776c80ba
SHA5121a0cbf18489c38ebf13f216ccfba2e31dd45b19566575e77652e4d8c4c9e3c55023c83728b38a25cd5cdba0f7e69fa8ad0b3b4c62e864579f37075862997690c
-
\??\pipe\LOCAL\crashpad_3112_BTQIAIMDFEJWVUKJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_3240_RXBGSKUKRJANEELNMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_3836_WVLEMKGFRYUXEIRCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_4648_WKGCDGVDPVTLXWJHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_4944_MMFJNAPFPEWJSFTGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_5068_OKOXMDAKAZCVDXEVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/220-245-0x0000000000000000-mapping.dmp
-
memory/224-202-0x0000000000000000-mapping.dmp
-
memory/320-185-0x0000000005460000-0x0000000005472000-memory.dmpFilesize
72KB
-
memory/320-153-0x0000000000000000-mapping.dmp
-
memory/320-161-0x0000000000C10000-0x0000000000C30000-memory.dmpFilesize
128KB
-
memory/320-293-0x0000000006860000-0x00000000068B0000-memory.dmpFilesize
320KB
-
memory/320-279-0x00000000057E0000-0x0000000005846000-memory.dmpFilesize
408KB
-
memory/1472-144-0x0000000000000000-mapping.dmp
-
memory/1528-142-0x0000000000000000-mapping.dmp
-
memory/2024-255-0x0000000000000000-mapping.dmp
-
memory/2244-297-0x0000000006C60000-0x0000000006E22000-memory.dmpFilesize
1.8MB
-
memory/2244-282-0x0000000005B30000-0x0000000005BC2000-memory.dmpFilesize
584KB
-
memory/2244-186-0x00000000050E0000-0x00000000051EA000-memory.dmpFilesize
1.0MB
-
memory/2244-184-0x0000000005510000-0x0000000005B28000-memory.dmpFilesize
6.1MB
-
memory/2244-165-0x0000000000760000-0x0000000000780000-memory.dmpFilesize
128KB
-
memory/2244-298-0x0000000007A70000-0x0000000007F9C000-memory.dmpFilesize
5.2MB
-
memory/2244-159-0x0000000000000000-mapping.dmp
-
memory/2244-281-0x00000000060E0000-0x0000000006684000-memory.dmpFilesize
5.6MB
-
memory/2484-211-0x0000000002190000-0x00000000021A6000-memory.dmpFilesize
88KB
-
memory/2484-218-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2484-166-0x0000000000000000-mapping.dmp
-
memory/2888-187-0x0000000000000000-mapping.dmp
-
memory/3112-140-0x0000000000000000-mapping.dmp
-
memory/3208-181-0x0000000000000000-mapping.dmp
-
memory/3236-135-0x0000000000000000-mapping.dmp
-
memory/3240-136-0x0000000000000000-mapping.dmp
-
memory/3308-139-0x0000000000000000-mapping.dmp
-
memory/3412-224-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/3412-150-0x0000000000000000-mapping.dmp
-
memory/3428-188-0x0000000005E40000-0x0000000005E7C000-memory.dmpFilesize
240KB
-
memory/3428-147-0x0000000000000000-mapping.dmp
-
memory/3428-160-0x0000000000620000-0x0000000000664000-memory.dmpFilesize
272KB
-
memory/3836-143-0x0000000000000000-mapping.dmp
-
memory/3968-295-0x00000000001E0000-0x00000000001EF000-memory.dmpFilesize
60KB
-
memory/3968-170-0x0000000000000000-mapping.dmp
-
memory/3968-296-0x0000000000400000-0x000000000062B000-memory.dmpFilesize
2.2MB
-
memory/3968-294-0x00000000007F3000-0x0000000000804000-memory.dmpFilesize
68KB
-
memory/4020-194-0x0000000000A40000-0x0000000000A60000-memory.dmpFilesize
128KB
-
memory/4020-189-0x0000000000000000-mapping.dmp
-
memory/4032-280-0x0000000005AA0000-0x0000000005B16000-memory.dmpFilesize
472KB
-
memory/4032-156-0x0000000000000000-mapping.dmp
-
memory/4032-162-0x0000000000C50000-0x0000000000C94000-memory.dmpFilesize
272KB
-
memory/4032-286-0x0000000005C80000-0x0000000005C9E000-memory.dmpFilesize
120KB
-
memory/4032-308-0x0000000000000000-mapping.dmp
-
memory/4372-191-0x0000000000000000-mapping.dmp
-
memory/4468-301-0x0000000000000000-mapping.dmp
-
memory/4536-133-0x0000000000000000-mapping.dmp
-
memory/4568-132-0x0000000000000000-mapping.dmp
-
memory/4648-131-0x0000000000000000-mapping.dmp
-
memory/4784-242-0x0000000000000000-mapping.dmp
-
memory/4860-302-0x0000000000000000-mapping.dmp
-
memory/4944-130-0x0000000000000000-mapping.dmp
-
memory/5012-283-0x00000000006E8000-0x000000000070E000-memory.dmpFilesize
152KB
-
memory/5012-299-0x00000000006E8000-0x000000000070E000-memory.dmpFilesize
152KB
-
memory/5012-300-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/5012-305-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/5012-304-0x00000000006E8000-0x000000000070E000-memory.dmpFilesize
152KB
-
memory/5012-285-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/5012-284-0x00000000005F0000-0x0000000000649000-memory.dmpFilesize
356KB
-
memory/5012-178-0x0000000000000000-mapping.dmp
-
memory/5068-134-0x0000000000000000-mapping.dmp
-
memory/5148-209-0x0000000000000000-mapping.dmp
-
memory/5164-303-0x0000000000000000-mapping.dmp
-
memory/5172-205-0x0000000000000000-mapping.dmp
-
memory/5196-213-0x0000000000000000-mapping.dmp
-
memory/5208-214-0x0000000000000000-mapping.dmp
-
memory/5220-208-0x0000000000000000-mapping.dmp
-
memory/5236-216-0x0000000000000000-mapping.dmp
-
memory/5264-212-0x0000000000000000-mapping.dmp
-
memory/5284-221-0x0000000000000000-mapping.dmp
-
memory/5300-217-0x0000000000000000-mapping.dmp
-
memory/5344-219-0x0000000000000000-mapping.dmp
-
memory/5356-220-0x0000000000000000-mapping.dmp
-
memory/5412-310-0x0000000000000000-mapping.dmp
-
memory/5432-226-0x0000000000000000-mapping.dmp
-
memory/5896-240-0x0000000000000000-mapping.dmp
-
memory/5920-249-0x0000000000000000-mapping.dmp
-
memory/6216-260-0x0000000000000000-mapping.dmp
-
memory/6356-265-0x0000000000000000-mapping.dmp
-
memory/6448-270-0x0000000000000000-mapping.dmp
-
memory/6564-274-0x0000000000000000-mapping.dmp
-
memory/6640-276-0x0000000000000000-mapping.dmp
-
memory/6748-278-0x0000000000000000-mapping.dmp
-
memory/6840-307-0x0000000000000000-mapping.dmp
-
memory/7032-288-0x0000000000000000-mapping.dmp
-
memory/7116-290-0x0000000000000000-mapping.dmp
-
memory/7160-292-0x0000000000000000-mapping.dmp