Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2022 05:45
Static task
static1
Behavioral task
behavioral1
Sample
0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe
Resource
win10v2004-20220721-en
General
-
Target
0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe
-
Size
1.2MB
-
MD5
2c758387330f81dbb0b9f2af057f9831
-
SHA1
10e0846638295ead8426048b6bc397f621a040b1
-
SHA256
0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b
-
SHA512
96037ba871911df66ff44d1b0c47f94ffa2407020d8f96ce6d249e423233cacc3ede69ee15d3c886c8a1cc545d983daaa4da5fd85e708dd94576abdcc3bc8b0b
Malware Config
Extracted
redline
nam3
103.89.90.61:18728
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
4
31.41.244.134:11643
-
auth_value
a516b2d034ecd34338f12b50347fbd92
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Extracted
redline
5076357887
195.54.170.157:16525
-
auth_value
0dfaff60271d374d0c206d19883e06f3
Extracted
raccoon
f0c8034c83808635df0d9d8726d1bfd6
http://45.95.11.158/
Signatures
-
Raccoon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4776-282-0x0000000000400000-0x000000000062B000-memory.dmp family_raccoon behavioral1/memory/4776-280-0x00000000001F0000-0x00000000001FF000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 12 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline behavioral1/memory/4148-165-0x0000000000610000-0x0000000000654000-memory.dmp family_redline behavioral1/memory/4904-166-0x00000000000D0000-0x0000000000114000-memory.dmp family_redline behavioral1/memory/3784-177-0x0000000000360000-0x0000000000380000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline behavioral1/memory/3432-182-0x0000000000360000-0x0000000000380000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline C:\Program Files (x86)\Company\NewProduct\jshainx.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline -
Executes dropped EXE 8 IoCs
Processes:
namdoitntn.exereal.exesafert44.exekukurzka9000.exeF0geI.exetag.exejshainx.exeme.exepid process 4148 namdoitntn.exe 3524 real.exe 4904 safert44.exe 4520 kukurzka9000.exe 4776 F0geI.exe 3784 tag.exe 3432 jshainx.exe 1312 me.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 10 IoCs
Processes:
0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exesetup.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\me.exe 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220807074602.pma setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\tag.exe 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\jshainx.exe 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\a66e5d67-5559-4b2d-99e4-36a45ef0cddf.tmp setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4128 4776 WerFault.exe F0geI.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
real.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exereal.exejshainx.exesafert44.exetag.exenamdoitntn.exeidentity_helper.exemsedge.exepid process 5544 msedge.exe 5544 msedge.exe 5568 msedge.exe 5568 msedge.exe 5608 msedge.exe 5608 msedge.exe 5644 msedge.exe 5644 msedge.exe 5664 msedge.exe 5664 msedge.exe 5096 msedge.exe 5096 msedge.exe 5720 msedge.exe 5720 msedge.exe 5952 msedge.exe 5952 msedge.exe 3524 real.exe 3524 real.exe 3432 jshainx.exe 3432 jshainx.exe 4904 safert44.exe 4904 safert44.exe 3784 tag.exe 3784 tag.exe 4148 namdoitntn.exe 4148 namdoitntn.exe 7260 identity_helper.exe 7260 identity_helper.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe 5796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
jshainx.exesafert44.exetag.exenamdoitntn.exedescription pid process Token: SeDebugPrivilege 3432 jshainx.exe Token: SeDebugPrivilege 4904 safert44.exe Token: SeDebugPrivilege 3784 tag.exe Token: SeDebugPrivilege 4148 namdoitntn.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exedescription pid process target process PID 4484 wrote to memory of 4844 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 4844 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 1608 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 1608 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 5096 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 5096 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 2024 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 2024 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 5096 wrote to memory of 2508 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 2508 5096 msedge.exe msedge.exe PID 4484 wrote to memory of 1436 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 1436 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4844 wrote to memory of 4940 4844 msedge.exe msedge.exe PID 4844 wrote to memory of 4940 4844 msedge.exe msedge.exe PID 1608 wrote to memory of 4976 1608 msedge.exe msedge.exe PID 1608 wrote to memory of 4976 1608 msedge.exe msedge.exe PID 2024 wrote to memory of 4944 2024 msedge.exe msedge.exe PID 2024 wrote to memory of 4944 2024 msedge.exe msedge.exe PID 1436 wrote to memory of 4744 1436 msedge.exe msedge.exe PID 1436 wrote to memory of 4744 1436 msedge.exe msedge.exe PID 4484 wrote to memory of 2908 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 2908 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 2908 wrote to memory of 3136 2908 msedge.exe msedge.exe PID 2908 wrote to memory of 3136 2908 msedge.exe msedge.exe PID 4484 wrote to memory of 3720 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 4484 wrote to memory of 3720 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe msedge.exe PID 3720 wrote to memory of 3976 3720 msedge.exe msedge.exe PID 3720 wrote to memory of 3976 3720 msedge.exe msedge.exe PID 4484 wrote to memory of 4148 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe namdoitntn.exe PID 4484 wrote to memory of 4148 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe namdoitntn.exe PID 4484 wrote to memory of 4148 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe namdoitntn.exe PID 4484 wrote to memory of 3524 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe real.exe PID 4484 wrote to memory of 3524 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe real.exe PID 4484 wrote to memory of 3524 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe real.exe PID 4484 wrote to memory of 4904 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe safert44.exe PID 4484 wrote to memory of 4904 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe safert44.exe PID 4484 wrote to memory of 4904 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe safert44.exe PID 4484 wrote to memory of 4520 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe kukurzka9000.exe PID 4484 wrote to memory of 4520 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe kukurzka9000.exe PID 4484 wrote to memory of 4520 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe kukurzka9000.exe PID 4484 wrote to memory of 4776 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe F0geI.exe PID 4484 wrote to memory of 4776 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe F0geI.exe PID 4484 wrote to memory of 4776 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe F0geI.exe PID 4484 wrote to memory of 3784 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe tag.exe PID 4484 wrote to memory of 3784 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe tag.exe PID 4484 wrote to memory of 3784 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe tag.exe PID 4484 wrote to memory of 3432 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe jshainx.exe PID 4484 wrote to memory of 3432 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe jshainx.exe PID 4484 wrote to memory of 3432 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe jshainx.exe PID 4484 wrote to memory of 1312 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe me.exe PID 4484 wrote to memory of 1312 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe me.exe PID 4484 wrote to memory of 1312 4484 0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe me.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe PID 5096 wrote to memory of 5272 5096 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe"C:\Users\Admin\AppData\Local\Temp\0f264f4e7431d4fc1f46d724fb66ab1833e4d54862a4b651e95727a4b4555b9b.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RyjC42⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcf69446f8,0x7ffcf6944708,0x7ffcf69447183⤵PID:4940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,10492004901791632135,17669593844642598906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:23⤵PID:5632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,10492004901791632135,17669593844642598906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1A4aK42⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcf69446f8,0x7ffcf6944708,0x7ffcf69447183⤵PID:4976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6521953408578880029,10976742590891204069,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵PID:5444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,6521953408578880029,10976742590891204069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RLtX42⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcf69446f8,0x7ffcf6944708,0x7ffcf69447183⤵PID:2508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:83⤵PID:5696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:23⤵PID:5272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:13⤵PID:6100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:13⤵PID:6256
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:13⤵PID:6712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:13⤵PID:6864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:13⤵PID:6980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:13⤵PID:7020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:13⤵PID:5652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:13⤵PID:2240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6396 /prefetch:83⤵PID:6732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5800 /prefetch:83⤵PID:5692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:13⤵PID:4896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:13⤵PID:6736
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8176 /prefetch:83⤵PID:7900
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:7948 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff732405460,0x7ff732405470,0x7ff7324054804⤵PID:8040
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8176 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:7260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7900 /prefetch:83⤵PID:5812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5844 /prefetch:83⤵PID:3548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2156,14632626833383602655,16072223537609233077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6016 /prefetch:83⤵PID:7660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RCgX42⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcf69446f8,0x7ffcf6944708,0x7ffcf69447183⤵PID:4944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12092080033531664048,17708305969670696499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:23⤵PID:5432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,12092080033531664048,17708305969670696499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1nfDK42⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcf69446f8,0x7ffcf6944708,0x7ffcf69447183⤵PID:4744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,14269458327200894888,2430236380955189384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14269458327200894888,2430236380955189384,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:23⤵PID:5308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1AbtZ42⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcf69446f8,0x7ffcf6944708,0x7ffcf69447183⤵PID:3136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17637931138208824450,3057717600866793063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17637931138208824450,3057717600866793063,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:23⤵PID:5484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1n6sL42⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcf69446f8,0x7ffcf6944708,0x7ffcf69447183⤵PID:3976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6490332006093499653,7049836269275718005,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵PID:5408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,6490332006093499653,7049836269275718005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5568 -
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148 -
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3524 -
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904 -
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
PID:4520 -
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 10523⤵
- Program crash
PID:4128 -
C:\Program Files (x86)\Company\NewProduct\tag.exe"C:\Program Files (x86)\Company\NewProduct\tag.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784 -
C:\Program Files (x86)\Company\NewProduct\me.exe"C:\Program Files (x86)\Company\NewProduct\me.exe"2⤵
- Executes dropped EXE
PID:1312 -
C:\Program Files (x86)\Company\NewProduct\jshainx.exe"C:\Program Files (x86)\Company\NewProduct\jshainx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4776 -ip 47761⤵PID:6196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
178KB
MD58d24da259cd54db3ede2745724dbedab
SHA196f51cc49e1a6989dea96f382f2a958f488662a9
SHA25642f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883
SHA512ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
178KB
MD58d24da259cd54db3ede2745724dbedab
SHA196f51cc49e1a6989dea96f382f2a958f488662a9
SHA25642f46c886e929d455bc3adbd693150d16f94aa48b050cfa463e399521c50e883
SHA512ec005a5ae8585088733fb692d78bbf2ff0f4f395c4b734e9d3bed66d6a73c2ee24c02da20351397768f2420c703ad47ffee785a2a2af455a000ab0e6620ec536
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD52647a5be31a41a39bf2497125018dbce
SHA1a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA25684c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
SHA51268f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26
-
C:\Program Files (x86)\Company\NewProduct\jshainx.exeFilesize
107KB
MD52647a5be31a41a39bf2497125018dbce
SHA1a1ac856b9d6556f5bb3370f0342914eb7cbb8840
SHA25684c7458316adf09943e459b4fb1aa79bd359ec1516e0ad947f44bdc6c0931665
SHA51268f70140af2ad71a40b6c884627047cdcbc92b4c6f851131e61dc9db3658bde99c1a09cad88c7c922aa5873ab6829cf4100dc12b75f237b2465e22770657ae26
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.5MB
MD582259f982c66e0bdb6a9976e6eff4665
SHA1df559539e52d4277762535fc694e888487e58e01
SHA256ba7eda28581bd1147ab6661aacd1b61435671381c9bae3a8a6651aa40a8a0bce
SHA512e9e42def570e1d27574f80979fabb742861eaa828a96240d2a84b3418318460b96ed6b9209699c08221abb5765c7b1a708de6f89903d812c621259e0802b7ec1
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.5MB
MD582259f982c66e0bdb6a9976e6eff4665
SHA1df559539e52d4277762535fc694e888487e58e01
SHA256ba7eda28581bd1147ab6661aacd1b61435671381c9bae3a8a6651aa40a8a0bce
SHA512e9e42def570e1d27574f80979fabb742861eaa828a96240d2a84b3418318460b96ed6b9209699c08221abb5765c7b1a708de6f89903d812c621259e0802b7ec1
-
C:\Program Files (x86)\Company\NewProduct\me.exeFilesize
289KB
MD5995a9cccc302fa4fff102704a74d50ac
SHA1f150f4a460b0383f6a4f2b0969b884cb4f69a8f0
SHA256d66f7f2dac7e6efdfe9518bf30ce27107d39e352442ad5817914962ea2b338c5
SHA5121b88158838d3f205cb1cc6467fa180454e1debf224c75fca87866d6be8e8500326caf7c7b228b01d27705bd53a4785f787074a949573e53aa0b9d9cafc30a915
-
C:\Program Files (x86)\Company\NewProduct\me.exeFilesize
289KB
MD5995a9cccc302fa4fff102704a74d50ac
SHA1f150f4a460b0383f6a4f2b0969b884cb4f69a8f0
SHA256d66f7f2dac7e6efdfe9518bf30ce27107d39e352442ad5817914962ea2b338c5
SHA5121b88158838d3f205cb1cc6467fa180454e1debf224c75fca87866d6be8e8500326caf7c7b228b01d27705bd53a4785f787074a949573e53aa0b9d9cafc30a915
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD584d016c5a9e810c2ef08767805a87589
SHA1750b15c9c1acdfcd1396ecec11ab109706a945ad
SHA2566e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845
SHA5127c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD584d016c5a9e810c2ef08767805a87589
SHA1750b15c9c1acdfcd1396ecec11ab109706a945ad
SHA2566e8bae93bead10d8778a8f442828aac20a0bd5c87cabe3f6d76282a9d47b7845
SHA5127c612dd0f3eab6cb602c12390f62daa0e75d83433bcd4b682d1d5b931ebc52c8f6b32acd12474bdf6eecb91541dfa11cbbd57ca6cf8297ae9c407923e4d95953
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD539d33ed8e39d48cbbe10137b840a938a
SHA1af463ffd0fe9508fb7c71585709eaada860626bc
SHA256d2dd2e1482b5a8808b7a88a8979fa6ad2ded1a99a0b6c83ddcc3004261d01451
SHA51218c96d2add074aaa3dd470ba01f104be0f107d51417bc8c8a609f69a444e598049b3fbe4d2a84f29b7e59e0aa5de474655735418d2838e8efe20aa675b96f6bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c4f48398fdb31b8bd84eadac9ddf5acc
SHA156bc7ec79f71a6f609e12c1c8ca68c9a83c352e5
SHA2568acec190b9fa36a48e95fa130737ceb06cb498c771ff6874ebc47da5825d1746
SHA51216b756eae47dae99f48803625c7a0c30e306a76c27578c829cccf32c9cb52df0aea32bc92d07c7b18fe249cf4fa443e2365d07f0bec4bf47f97af762b7ab3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\CookiesFilesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web DataFilesize
112KB
MD530e375798049100677ea16b7c578a4ee
SHA1bcab7401a5f34ac0e6f795ece8d3ed12944ae99f
SHA256ea5c90cfc97f429a2f9e0b1e9b16778b5b19bd8e83a896a30002de70af84e1ce
SHA512f8ae930e26ecfe06dc30d4f39858b0eec6b4a81a8139883712505b5c6b58504d463d986ef58c7151a247fe157c6013b570b9d39e1d4a860061e37e0419900582
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5861ab321eaed288ca891e40e4497996e
SHA16fe2350fa7585404906a3abdb3d633fbf0f2b0a9
SHA2562b74c867757b764c7d8eebd1c76855f2d4c3cf14f810e3806152223fc93a1d86
SHA51223d838bbd83fe1db1360b06d7ae8eb9009100b2b1e2e459449f31361417545d71a526b1a7f7b5d9b0b83d9d93269a1ea3e5f8977295ad09432b428b259df4aed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD54e3be1cb9946995f9efdb15a5d8a3577
SHA1960e4c03b4cee3e2db58a436d40e0e4ebdd46a5d
SHA25628fe3ec3be095ae7e428dba8ca8ff00c2c0d3dcfc00ae4072e4930e3df7c3f16
SHA5122b6e0449ad93d844245916e62be2b59c222eda57fa00d059a2f792d995966dcaeea69d4d14d0da85285dfa46e0d8e5fa010a7100ac88e1984c2aa322d7059d2c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5b6e5d53308af885ca7020012a466ad5c
SHA15d77c86cf1bd83f571aca778e277f7f947ba0b5b
SHA256d00bdf72114449852679b392568a73707e14b858d29fae4f5ef7d902ea9fbe25
SHA51227eaf3ba07a39bb537cf6d11047f58c14d34b3d2cb308ee1c6f90bdc07b802bf083b816adbf80865a40c95cfd5766e1ab76ec885fa569550a6771c9cd2f1f03c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5f28190da1cf199506bd32d321f266560
SHA1774e2327b0facd3d496c4e65d65b46c742906863
SHA256110269ef4698086406c453692319ac36710d6aeb2c32287e781c60290e4ed7a0
SHA5129e999fdbe60a906bb9919d49dd15d9f76135ca764511d44bf7c597c029eac16ca8c45ab299f3313d6864970725fb8b77840f198a44b0699603c93aa77aa72c56
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5a61eae23c84be7efb7d0a832ce9b7c88
SHA194fabf8595b44b473af2d048bdc553e1296e55b3
SHA256b75a3010136a7fd4cc8fa7146e2402cfc2ab42bfd0b9fba49cb427f97b3309b1
SHA512e0f508750b288519f7f3abc65c20679404f100133feaa18f045c1ffa715e306da4e224e15835df9aa9e3ae05d3ef391d2a88b870f257c926f43e7ad03adc9f88
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD566962ad030af810f6c6f26ffb6991cac
SHA1f51a8a254ece4279264b8c8b78bbfa25bc643462
SHA2562d198a68b130855ecd51a8677a54cad9e59698ed031c1383c3be088712dca854
SHA512efcbf1cad4a7ee84917dd764f6e8d7eb66b023825a360c3d672e1c3e360f8eeae41a59260a79f2dd65797568e39a34f5cf267364c47eadbc8ccfd19aecf5f692
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5a61eae23c84be7efb7d0a832ce9b7c88
SHA194fabf8595b44b473af2d048bdc553e1296e55b3
SHA256b75a3010136a7fd4cc8fa7146e2402cfc2ab42bfd0b9fba49cb427f97b3309b1
SHA512e0f508750b288519f7f3abc65c20679404f100133feaa18f045c1ffa715e306da4e224e15835df9aa9e3ae05d3ef391d2a88b870f257c926f43e7ad03adc9f88
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5861ab321eaed288ca891e40e4497996e
SHA16fe2350fa7585404906a3abdb3d633fbf0f2b0a9
SHA2562b74c867757b764c7d8eebd1c76855f2d4c3cf14f810e3806152223fc93a1d86
SHA51223d838bbd83fe1db1360b06d7ae8eb9009100b2b1e2e459449f31361417545d71a526b1a7f7b5d9b0b83d9d93269a1ea3e5f8977295ad09432b428b259df4aed
-
\??\pipe\LOCAL\crashpad_1436_EPGNGBHXTNZKEQBHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_1608_IXMWVBPHSAFFJAHGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_2024_VYSDEOODBLQUVAMFMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_2908_BSKOEJKGPNEMFZOKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_3720_CRTQOWXGRKWMQEGLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_4844_NZWYJDKDVXVFVVEPMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_5096_NDRJHVAQMKMCUCODMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1312-181-0x0000000000000000-mapping.dmp
-
memory/1436-135-0x0000000000000000-mapping.dmp
-
memory/1608-131-0x0000000000000000-mapping.dmp
-
memory/2024-133-0x0000000000000000-mapping.dmp
-
memory/2240-268-0x0000000000000000-mapping.dmp
-
memory/2508-134-0x0000000000000000-mapping.dmp
-
memory/2908-140-0x0000000000000000-mapping.dmp
-
memory/3136-144-0x0000000000000000-mapping.dmp
-
memory/3432-182-0x0000000000360000-0x0000000000380000-memory.dmpFilesize
128KB
-
memory/3432-288-0x0000000006560000-0x00000000065B0000-memory.dmpFilesize
320KB
-
memory/3432-178-0x0000000000000000-mapping.dmp
-
memory/3524-152-0x0000000000000000-mapping.dmp
-
memory/3524-216-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/3548-297-0x0000000000000000-mapping.dmp
-
memory/3720-147-0x0000000000000000-mapping.dmp
-
memory/3784-167-0x0000000000000000-mapping.dmp
-
memory/3784-177-0x0000000000360000-0x0000000000380000-memory.dmpFilesize
128KB
-
memory/3784-186-0x0000000004BB0000-0x0000000004BC2000-memory.dmpFilesize
72KB
-
memory/3976-148-0x0000000000000000-mapping.dmp
-
memory/4148-278-0x0000000006710000-0x00000000067A2000-memory.dmpFilesize
584KB
-
memory/4148-287-0x00000000068B0000-0x00000000068CE000-memory.dmpFilesize
120KB
-
memory/4148-281-0x0000000008340000-0x00000000088E4000-memory.dmpFilesize
5.6MB
-
memory/4148-150-0x0000000000000000-mapping.dmp
-
memory/4148-275-0x0000000005E40000-0x0000000005EB6000-memory.dmpFilesize
472KB
-
memory/4148-165-0x0000000000610000-0x0000000000654000-memory.dmpFilesize
272KB
-
memory/4148-274-0x0000000005C30000-0x0000000005C96000-memory.dmpFilesize
408KB
-
memory/4148-196-0x0000000005770000-0x00000000057AC000-memory.dmpFilesize
240KB
-
memory/4520-159-0x0000000000000000-mapping.dmp
-
memory/4744-139-0x0000000000000000-mapping.dmp
-
memory/4776-279-0x00000000007F3000-0x0000000000804000-memory.dmpFilesize
68KB
-
memory/4776-282-0x0000000000400000-0x000000000062B000-memory.dmpFilesize
2.2MB
-
memory/4776-160-0x0000000000000000-mapping.dmp
-
memory/4776-280-0x00000000001F0000-0x00000000001FF000-memory.dmpFilesize
60KB
-
memory/4844-130-0x0000000000000000-mapping.dmp
-
memory/4896-284-0x0000000000000000-mapping.dmp
-
memory/4904-188-0x0000000004BC0000-0x0000000004CCA000-memory.dmpFilesize
1.0MB
-
memory/4904-289-0x00000000068C0000-0x0000000006A82000-memory.dmpFilesize
1.8MB
-
memory/4904-166-0x00000000000D0000-0x0000000000114000-memory.dmpFilesize
272KB
-
memory/4904-185-0x0000000005080000-0x0000000005698000-memory.dmpFilesize
6.1MB
-
memory/4904-156-0x0000000000000000-mapping.dmp
-
memory/4904-290-0x0000000008310000-0x000000000883C000-memory.dmpFilesize
5.2MB
-
memory/4940-136-0x0000000000000000-mapping.dmp
-
memory/4944-138-0x0000000000000000-mapping.dmp
-
memory/4976-137-0x0000000000000000-mapping.dmp
-
memory/5096-132-0x0000000000000000-mapping.dmp
-
memory/5272-199-0x0000000000000000-mapping.dmp
-
memory/5308-202-0x0000000000000000-mapping.dmp
-
memory/5408-204-0x0000000000000000-mapping.dmp
-
memory/5432-212-0x0000000000000000-mapping.dmp
-
memory/5444-205-0x0000000000000000-mapping.dmp
-
memory/5484-207-0x0000000000000000-mapping.dmp
-
memory/5544-206-0x0000000000000000-mapping.dmp
-
memory/5568-209-0x0000000000000000-mapping.dmp
-
memory/5608-211-0x0000000000000000-mapping.dmp
-
memory/5632-220-0x0000000000000000-mapping.dmp
-
memory/5644-214-0x0000000000000000-mapping.dmp
-
memory/5652-266-0x0000000000000000-mapping.dmp
-
memory/5664-215-0x0000000000000000-mapping.dmp
-
memory/5692-277-0x0000000000000000-mapping.dmp
-
memory/5696-225-0x0000000000000000-mapping.dmp
-
memory/5720-219-0x0000000000000000-mapping.dmp
-
memory/5796-298-0x0000000000000000-mapping.dmp
-
memory/5812-295-0x0000000000000000-mapping.dmp
-
memory/5952-227-0x0000000000000000-mapping.dmp
-
memory/6100-235-0x0000000000000000-mapping.dmp
-
memory/6256-241-0x0000000000000000-mapping.dmp
-
memory/6712-248-0x0000000000000000-mapping.dmp
-
memory/6732-272-0x0000000000000000-mapping.dmp
-
memory/6736-286-0x0000000000000000-mapping.dmp
-
memory/6864-255-0x0000000000000000-mapping.dmp
-
memory/6980-262-0x0000000000000000-mapping.dmp
-
memory/7020-264-0x0000000000000000-mapping.dmp
-
memory/7260-293-0x0000000000000000-mapping.dmp
-
memory/7660-300-0x0000000000000000-mapping.dmp
-
memory/7948-291-0x0000000000000000-mapping.dmp
-
memory/8040-292-0x0000000000000000-mapping.dmp