Analysis

  • max time kernel
    294s
  • max time network
    302s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2023 19:09

General

  • Target

    INV_REF-1228_19.pdf

  • Size

    94KB

  • MD5

    d4bdd8c5f25264ba410907a6ceaa87c3

  • SHA1

    06d21dcee23d6d2dd860ebb561a2d544b6769ba0

  • SHA256

    55bfe56ed452f893a06292087001f06af403adb00bcd55d537ffa66c7f165e2b

  • SHA512

    5fdc8a5f46ede4e25bb3dd72eed4bfe7ea9013a4b5bb49cc1a69128a540a904f0afc803446601fd7c928931824aa98e521ef1f3250cab51730d01c784afee788

  • SSDEEP

    1536:KHrVruV5xV0HUW8imnHPNzTUqZiL+I1MiFFtSlzg3h/8k+jFNIypzERCzd1tnAnY:KLCr0HUDimnvNXHCFUlzkwEyYCzd1t8O

Malware Config

Extracted

Family

icedid

Campaign

3247066813

C2

whothitheka.com

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Blocklisted process makes network request 10 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 21 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Loads dropped DLL 26 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\INV_REF-1228_19.pdf"
    1⤵
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=192325717DB0B4372BAC6663252DCD52 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
        3⤵
          PID:1796
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=901A21B5D11E5E7FDAD8C06DD5C5AA73 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=901A21B5D11E5E7FDAD8C06DD5C5AA73 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:1
          3⤵
            PID:1960
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5AD2DA844DC14E0B22F4043514DB30FE --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
            3⤵
              PID:5060
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=40C928B5FECDDF211A4EE1488803A6C3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=40C928B5FECDDF211A4EE1488803A6C3 --renderer-client-id=5 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job /prefetch:1
              3⤵
                PID:4368
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=88A3A9A010F982D7A1C3D6107811735E --mojo-platform-channel-handle=1848 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                3⤵
                  PID:1372
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D37895384B67F013448C0D78A9786A87 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  3⤵
                    PID:2892
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://firebasestorage.googleapis.com/v0/b/beaming-key-371800.appspot.com/o/uQk2lWq0bW%2FDocs_REF-1228%2325.zip?alt=media&token=b8270c51-dfc5-489a-9e68-fc2ca2dc7a28
                  2⤵
                  • Adds Run key to start application
                  • Checks SCSI registry key(s)
                  • Enumerates system info in registry
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  PID:4440
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd0be946f8,0x7ffd0be94708,0x7ffd0be94718
                    3⤵
                      PID:4128
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                      3⤵
                        PID:764
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:3
                        3⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3320
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:8
                        3⤵
                          PID:2984
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                          3⤵
                            PID:4608
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                            3⤵
                              PID:5076
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4872 /prefetch:8
                              3⤵
                                PID:708
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5104 /prefetch:8
                                3⤵
                                  PID:904
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:8
                                  3⤵
                                    PID:1928
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                    3⤵
                                    • Drops file in Program Files directory
                                    PID:2840
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x200,0x22c,0x7ff71ef25460,0x7ff71ef25470,0x7ff71ef25480
                                      4⤵
                                        PID:1448
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:8
                                      3⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4656
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1
                                      3⤵
                                        PID:3952
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                                        3⤵
                                          PID:3596
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5592 /prefetch:8
                                          3⤵
                                            PID:1592
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:1
                                            3⤵
                                              PID:3020
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:8
                                              3⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2756
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1936 /prefetch:8
                                              3⤵
                                                PID:6112
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6588 /prefetch:8
                                                3⤵
                                                  PID:1692
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3124 /prefetch:8
                                                  3⤵
                                                    PID:5152
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5944 /prefetch:2
                                                    3⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:960
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3512 /prefetch:8
                                                    3⤵
                                                      PID:4864
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4532 /prefetch:8
                                                      3⤵
                                                        PID:5732
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5208 /prefetch:8
                                                        3⤵
                                                          PID:3360
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1136 /prefetch:8
                                                          3⤵
                                                            PID:1452
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2140,12333989686315928940,7315820878234766481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1076 /prefetch:8
                                                            3⤵
                                                              PID:4488
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:3132
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                            1⤵
                                                              PID:3928
                                                            • C:\Windows\System32\rundll32.exe
                                                              "C:\Windows\System32\rundll32.exe" \pachow.dat,init
                                                              1⤵
                                                              • Blocklisted process makes network request
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:6020
                                                            • C:\Windows\System32\rundll32.exe
                                                              "C:\Windows\System32\rundll32.exe" \pachow.dat,init
                                                              1⤵
                                                              • Blocklisted process makes network request
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:1864
                                                            • C:\Windows\System32\rundll32.exe
                                                              "C:\Windows\System32\rundll32.exe" \pachow.dat,init
                                                              1⤵
                                                              • Blocklisted process makes network request
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5448
                                                            • C:\Windows\System32\rundll32.exe
                                                              "C:\Windows\System32\rundll32.exe" \pachow.dat,init
                                                              1⤵
                                                              • Blocklisted process makes network request
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5576
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
                                                              1⤵
                                                                PID:5872
                                                                • C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5872_371932660\msedgerecovery.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5872_371932660\msedgerecovery.exe" --appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062} --browser-version=92.0.902.67 --sessionid={9f59ce3a-97f4-4ff0-bec2-0d24a4a6a4bb} --system
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  PID:5700
                                                                  • C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5872_371932660\MicrosoftEdgeUpdateSetup.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5872_371932660\MicrosoftEdgeUpdateSetup.exe" /install "runtime=true&needsadmin=true" /installsource chromerecovery /silent
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in Program Files directory
                                                                    PID:5268
                                                                    • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\MicrosoftEdgeUpdate.exe
                                                                      "C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\MicrosoftEdgeUpdate.exe" /install "runtime=true&needsadmin=true" /installsource chromerecovery /silent
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Sets file execution options in registry
                                                                      • Loads dropped DLL
                                                                      • Drops file in Program Files directory
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4812
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Modifies registry class
                                                                        PID:392
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Modifies registry class
                                                                        PID:1564
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Registers COM server for autorun
                                                                          • Loads dropped DLL
                                                                          • Modifies registry class
                                                                          PID:4500
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Registers COM server for autorun
                                                                          • Loads dropped DLL
                                                                          • Modifies registry class
                                                                          PID:1712
                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Registers COM server for autorun
                                                                          • Loads dropped DLL
                                                                          • Modifies registry class
                                                                          PID:4220
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSJEQURZIiBwcm9kdWN0X25hbWU9IlN0YW5kYXJkIFBDIChRMzUgKyBJQ0g5LCAyMDA5KSIvPjxleHAgZXRhZz0iJnF1b3Q7bTQ2SzVLNXoxdnZrTkxIcjRjMXgvaENqZTdaUUxkcUt5WjVOd2d6VjNBOD0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7RjNDNEZFMDAtRUZENS00MDNCLTk1NjktMzk4QTIwRjFCQTRBfSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMS4zLjE2OS4zMSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTc0OTQwNDY2NiIgaW5zdGFsbF90aW1lX21zPSIxMTA5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        PID:4344
                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /machine /installsource chromerecovery
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:6100
                                                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Modifies data under HKEY_USERS
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:5604
                                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-PC9hcHA-PC9yZXF1ZXN0Pg
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  PID:5176
                                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3E92F4C-28A4-4C64-BD26-A98B203EBAB7}\MicrosoftEdgeUpdateSetup_X86_1.3.171.39.exe
                                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3E92F4C-28A4-4C64-BD26-A98B203EBAB7}\MicrosoftEdgeUpdateSetup_X86_1.3.171.39.exe" /update /sessionid "{67846B97-0061-4C62-BF61-8677237FC79A}"
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in Program Files directory
                                                                  PID:5708
                                                                  • C:\Program Files (x86)\Microsoft\Temp\EU1F5.tmp\MicrosoftEdgeUpdate.exe
                                                                    "C:\Program Files (x86)\Microsoft\Temp\EU1F5.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{67846B97-0061-4C62-BF61-8677237FC79A}"
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Sets file execution options in registry
                                                                    • Loads dropped DLL
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4780
                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Modifies registry class
                                                                      PID:2084
                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Modifies registry class
                                                                      PID:4360
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Registers COM server for autorun
                                                                        • Loads dropped DLL
                                                                        • Modifies registry class
                                                                        PID:2440
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Registers COM server for autorun
                                                                        • Loads dropped DLL
                                                                        • Modifies registry class
                                                                        PID:3460
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.171.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Registers COM server for autorun
                                                                        • Loads dropped DLL
                                                                        • Modifies registry class
                                                                        PID:6084
                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV4cCBldGFnPSImcXVvdDtxV0pTeld3UGZkY0xSK1hHSXY2eHJaZmlZT3hoUFUyczFOV21qV2NhRlBnPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTY5LjMxIiBuZXh0dmVyc2lvbj0iMS4zLjE3MS4zOSIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGV4cGVyaW1lbnRzPSJjaHJvbWVyZWMzPTIwMjMwMlIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTY3MzM4MTU4OCI-PGV2ZW50IGV2ZW50dHlwZT0iMyIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjM2MzA2OTc4OCIvPjwvYXBwPjwvcmVxdWVzdD4
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:4292
                                                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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-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-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-PHBpbmcgcj0iMTUwIiByZD0iNTcwMyIgcGluZ19mcmVzaG5lc3M9IntCMDQ2NTY0Qy03NkRBLTRCMDctQjVFMy0yNzUxNEJFOTk3NTF9Ii8-PC9hcHA-PGFwcCBhcHBpZD0iezU2RUIxOEY4LUIwMDgtNENCRC1CNkQyLThDOTdGRTdFOTA2Mn0iIHZlcnNpb249IjkyLjAuOTAyLjY3IiBuZXh0dmVyc2lvbj0iIiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGxhc3RfbGF1bmNoX3RpbWU9IjEzMzE3ODU1MDI2Nzc2Nzg1MCI-PHVwZGF0ZWNoZWNrLz48cGluZyBhY3RpdmU9IjEiIGE9Ii0xIiByPSIxNTAiIGFkPSItMSIgcmQ9IjU3MDMiIHBpbmdfZnJlc2huZXNzPSJ7NDE4MEYxNjEtMTY1OS00MDJDLUJCQ0UtMTVCNDFFQzE1NTdCfSIvPjwvYXBwPjwvcmVxdWVzdD4
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  PID:5692

                                                              Network

                                                              MITRE ATT&CK Matrix ATT&CK v6

                                                              Persistence

                                                              Registry Run Keys / Startup Folder

                                                              3
                                                              T1060

                                                              Defense Evasion

                                                              Modify Registry

                                                              3
                                                              T1112

                                                              Discovery

                                                              Query Registry

                                                              3
                                                              T1012

                                                              Peripheral Device Discovery

                                                              1
                                                              T1120

                                                              System Information Discovery

                                                              3
                                                              T1082

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5872_371932660\MicrosoftEdgeUpdateSetup.exe
                                                                Filesize

                                                                1.5MB

                                                                MD5

                                                                f70962a7883fefe8defa224c1ffdadfa

                                                                SHA1

                                                                efd06b7c1b5ead8cec2cd029a8d8ccb0c46ee2da

                                                                SHA256

                                                                3e726854ff0a0046de458afc2cd58cfc37430b4c7969395111398f47d8f63bb4

                                                                SHA512

                                                                678c10874e6089acde5c57cdc64e11a76cbc9b3e7c882f9c1eaa619f897675c8f145e4be4825d8197edb2e645035a0953c3ed5a34da3e84d013fea5599699761

                                                              • C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5872_371932660\MicrosoftEdgeUpdateSetup.exe
                                                                Filesize

                                                                1.5MB

                                                                MD5

                                                                f70962a7883fefe8defa224c1ffdadfa

                                                                SHA1

                                                                efd06b7c1b5ead8cec2cd029a8d8ccb0c46ee2da

                                                                SHA256

                                                                3e726854ff0a0046de458afc2cd58cfc37430b4c7969395111398f47d8f63bb4

                                                                SHA512

                                                                678c10874e6089acde5c57cdc64e11a76cbc9b3e7c882f9c1eaa619f897675c8f145e4be4825d8197edb2e645035a0953c3ed5a34da3e84d013fea5599699761

                                                              • C:\Program Files (x86)\Microsoft\Edge\MSEdgeRecovery\scoped_dir5872_371932660\msedgerecovery.exe
                                                                Filesize

                                                                1.1MB

                                                                MD5

                                                                3b2bd3e2b22afa49576723c819a1185b

                                                                SHA1

                                                                41a1590e22600c717acd9e376b9020b3021dada6

                                                                SHA256

                                                                b2900c435244e948491cfab330b570b4326d1879c5c2be2aa35ce8bd49446d05

                                                                SHA512

                                                                a411b00da74a6c90d0a60a0d9a024a430c2c7483416dc95634bd62c5c29b9c9d1fd3310911f2da85df66aac08e9026df4aad00c083781ca22802b0236652d1d5

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\EdgeUpdate.dat
                                                                Filesize

                                                                12KB

                                                                MD5

                                                                369bbc37cff290adb8963dc5e518b9b8

                                                                SHA1

                                                                de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                                                SHA256

                                                                3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                                                SHA512

                                                                4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\MicrosoftEdgeComRegisterShellARM64.exe
                                                                Filesize

                                                                172KB

                                                                MD5

                                                                b462ad181104b32ec56a6a1e1aa25622

                                                                SHA1

                                                                c26dbc70359be470fb63d50e12528e473749d9f7

                                                                SHA256

                                                                5b95e7e42a2df4c8cb8a1dfc9e71f81831ffc128408ad1a37f83ab76dcdf1afb

                                                                SHA512

                                                                5f6b37f4e88b617ca68762706423e38da4eccb820e82635eda3ed269efeb92ae3285e0b1285978f35dd8df004c801ebbca2f7c061ae055070bdbcba88c474e70

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\MicrosoftEdgeUpdate.exe
                                                                Filesize

                                                                200KB

                                                                MD5

                                                                7bcf03ae20f6b4aab6efda45f6a0fa01

                                                                SHA1

                                                                6f1a63a994568c7cac224c6f44d41d19fe24a2e4

                                                                SHA256

                                                                23387b13f6386a095ae8f178c261f6565e5828fd7e67ef0cbb10e07224149ba6

                                                                SHA512

                                                                615d130b2f87d3f2ec125cc97391c6b318359a78f0135f10d0ffd5085062cde39935823865f139d767f9d7992dfa926358442369ab424fbe1d54b2c915992c4b

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\MicrosoftEdgeUpdate.exe
                                                                Filesize

                                                                200KB

                                                                MD5

                                                                7bcf03ae20f6b4aab6efda45f6a0fa01

                                                                SHA1

                                                                6f1a63a994568c7cac224c6f44d41d19fe24a2e4

                                                                SHA256

                                                                23387b13f6386a095ae8f178c261f6565e5828fd7e67ef0cbb10e07224149ba6

                                                                SHA512

                                                                615d130b2f87d3f2ec125cc97391c6b318359a78f0135f10d0ffd5085062cde39935823865f139d767f9d7992dfa926358442369ab424fbe1d54b2c915992c4b

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                Filesize

                                                                205KB

                                                                MD5

                                                                fccf8ebd72efacc9566b7849d59512aa

                                                                SHA1

                                                                2d0cc03e7912578d1c0a01e1d338290a0d1c157e

                                                                SHA256

                                                                a6a3b7b77ec3fcbdd07b516457fcc7368282ed84e04792316d2ceeeb3b6c84fb

                                                                SHA512

                                                                6e0b2e27ae19c3100b789b8b22eb307072a902878d92cea426ac02c07c8338934b49c57012a858e01816617ec6c41ef39b7a390e63c8975e56c4504faa8b6b3a

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\MicrosoftEdgeUpdateCore.exe
                                                                Filesize

                                                                250KB

                                                                MD5

                                                                524a95f05f4c0def70fa61a5f0717e9c

                                                                SHA1

                                                                6ee3b87e60e865d21bc1b5e434fea12fe262c315

                                                                SHA256

                                                                e17a7d9e0dcb1a3d6a21009f8d9b41fe1986312d79ffc6728c6c3f500dd6434f

                                                                SHA512

                                                                cc5e21ce182489416c906fb3f16e808554b739908916682cef6afe11a748b02382bfb93d1359cdc0794c2fb4b6f3cb9d9c677215a904be79d4b1df573de99089

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\NOTICE.TXT
                                                                Filesize

                                                                4KB

                                                                MD5

                                                                6dd5bf0743f2366a0bdd37e302783bcd

                                                                SHA1

                                                                e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                                                SHA256

                                                                91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                                                SHA512

                                                                f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdate.dll
                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                5f4cdf4268be23a984ee0b2feaad3dd3

                                                                SHA1

                                                                cc5aabfc567971d7d2b7a0a206925a59de79dad5

                                                                SHA256

                                                                bb92222715061ddc89332668248c696348b953a0251893ec7d36597099308d92

                                                                SHA512

                                                                41803d549742f3b22521d6b645adfafdc477c3fc315a88056b111d54cb0ba677db4a8162b793a19619f672b3580736d939367649d3729c129ef871b55900f0cd

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdate.dll
                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                5f4cdf4268be23a984ee0b2feaad3dd3

                                                                SHA1

                                                                cc5aabfc567971d7d2b7a0a206925a59de79dad5

                                                                SHA256

                                                                bb92222715061ddc89332668248c696348b953a0251893ec7d36597099308d92

                                                                SHA512

                                                                41803d549742f3b22521d6b645adfafdc477c3fc315a88056b111d54cb0ba677db4a8162b793a19619f672b3580736d939367649d3729c129ef871b55900f0cd

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_af.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                c7872f08802f693ed9fc16ea960789f6

                                                                SHA1

                                                                b0b8e4dfbe1dc76e4903216948374e1356d33e53

                                                                SHA256

                                                                de5d1223ffd38be89cd576b0de036760f8a84c231eb97f1d7f74dfcf4b41fb19

                                                                SHA512

                                                                339520bea363a1ea34e75755c70f4b1f6a189e7084ca9d5c6189d769965ae1fd0b093b948dffe3d256dd82591bdb2b3627ed20e747a2505377babc34eb94a0e6

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_am.dll
                                                                Filesize

                                                                24KB

                                                                MD5

                                                                6dee4281b2d0dc43c8eac5afde5dc5b2

                                                                SHA1

                                                                35584539f94fa4a91229b8d810f1d5c0207d9ef8

                                                                SHA256

                                                                b0fc60e07fa8fcfa0a174f1f5fc3a303d5498669eba846d51731494e9f86e46e

                                                                SHA512

                                                                de6a54e08c1a7c2a77a26f9de11a8e25b30f3d275fd4b72fb068ec3a5c0fd2072cc02a33b4581ba0dd565963bb834c5da831013d9ffb4386d0fc59935c184079

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_ar.dll
                                                                Filesize

                                                                26KB

                                                                MD5

                                                                c5e0d596829abbf221a7e2fcc3f37059

                                                                SHA1

                                                                2a55fc6e9110d0bc5d735bd98e56241e416dd5eb

                                                                SHA256

                                                                9e3a04823e12f15954f1082ec019e29e1821d03db69fbaf9c906be28c8cf4fcf

                                                                SHA512

                                                                518a004482c590d87e104be80dcb12455379ac855a53bdfb94023041fac16e4806e4c78f28716f179031d62b21912cdf4be8b43b2a13747acc8e9a745dd6333b

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_as.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                f344ea79294c175a3233be3c7bd4f7ab

                                                                SHA1

                                                                42f4d616f0b48828b629ffb384249edc76fea3a9

                                                                SHA256

                                                                36551c9271d084f31facbd342a0a0b5e530a2070e7de34c42ef2987633134b99

                                                                SHA512

                                                                dac1c65916fbca857dc8b5a0a3ef9c6abd5090e2c99ada98809d6cf04d09d4b9d63256e4a57754960476896ea46027cfb06bbb3ae68df573b207ca267d4efe94

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_az.dll
                                                                Filesize

                                                                29KB

                                                                MD5

                                                                34c97ccc6da86fa0fc6aca8102115683

                                                                SHA1

                                                                23c30d6f41bbfccb40d5209d70999384f3d59893

                                                                SHA256

                                                                205be42f8590a17ce1a0da594c818f84ef8cc19f8f54cd74acd16ddf7df11684

                                                                SHA512

                                                                7100e92fd948b75f7d134e813a836ce9691e6994f989b6d53255b17e3fca5be55cf69c50ef01e625a8f85a764bfafcf49bc5f82d229bf44168bf89b953c1642c

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_bg.dll
                                                                Filesize

                                                                29KB

                                                                MD5

                                                                83976f605267f63c512741c90085ef37

                                                                SHA1

                                                                e1907443ecf114b1b2d4b5fb622ca6fcba0d6b2c

                                                                SHA256

                                                                8e7bc240557c0f4058fb3380d01584eb5b9ad69ac5fd2f7a56bf2293dafd6069

                                                                SHA512

                                                                d5713af38add972fc04c1b1b7aca033532c50c31e8d1e3c0e889d69c94ff2d2ecdec95edabf4717a4bc649f2d68a5b1a77dac0355bf493eefe2cf86b7b53ba84

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_bn-IN.dll
                                                                Filesize

                                                                29KB

                                                                MD5

                                                                055acbbed4580bb0c2b15ad8407f34c5

                                                                SHA1

                                                                cf7c3539d97090b33ea5cb7d4880dd1b28c259f3

                                                                SHA256

                                                                edb350193ce5ee7984cd11d446ee5848879e6447b08a6e9353a8310a1574bce7

                                                                SHA512

                                                                11e9e78b28e868781b355de473c157f4fbf1b8f30e3cae6f19aa895a456e7876827ff859ee4bc65215b73ed27eac67c139a1cfc887adee0f7fa1c2c446962311

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_bn.dll
                                                                Filesize

                                                                29KB

                                                                MD5

                                                                89d1459c67621ae933ea973c36c86830

                                                                SHA1

                                                                7793109fad9c7d6e267046be6f188262d6655736

                                                                SHA256

                                                                faa59f14007729085711f504f3580b5d1f289d9d6b8a57ecaa6b7980d9b3b9e8

                                                                SHA512

                                                                95e333c1d28ba10df6e95e7bcf80fd1cd3fb7e32aa72b1749a4983c762fa227915d49547c5be114a471072d21a5f9c87c24bd6f45e8a711cbecc1074a3cefd7b

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_bs.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                a2ae01f60764eb9717c2e843bdd40c43

                                                                SHA1

                                                                f611b0f880d1dc52a5ff996b5106c8c0bdd7cf68

                                                                SHA256

                                                                9542302df51fad8c1095f6068378608b8edc89a633b30d26cae0e0fcb4515da3

                                                                SHA512

                                                                e12d3634bd8738865ea210775d78e53c5a30e74dca39655882c2464d1f9a1ac4a96a7608e57a92ff3b7b6a77750ab24ff12df59e5006b18c1f83cc270760bad5

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_ca-Es-VALENCIA.dll
                                                                Filesize

                                                                29KB

                                                                MD5

                                                                97fe80b8bc29698d3dd3912878d8a785

                                                                SHA1

                                                                580f290f32bf083f9485e06165fcc751ae181be0

                                                                SHA256

                                                                c382b8fe1abc83ebe97e66a3d4737ab66a7210a59fc0d18f9fc8b6735771b247

                                                                SHA512

                                                                08f56d8759721b0241d60a532e9634bc98aebcb7e7c251630adc1c93d28d40158a6f3bafc32f19cf9aa27ad5ba6e42f58bc2c8361e1ff97aa2ddf05c0147d248

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_ca.dll
                                                                Filesize

                                                                30KB

                                                                MD5

                                                                2293c9a1af6be53ef61f8fc168e181d7

                                                                SHA1

                                                                f37155a592bcb1cbaeb67509b36797087d228b8b

                                                                SHA256

                                                                0b00898937e1f40415a42a8aa4dcf4ea396c40083abfe04fd141edcdd1d35600

                                                                SHA512

                                                                ac4c27db8296283292d06e0d152434f18a227c4d68294ef52ca473736458724df374f20ce88d214486d7027696d081203e92fb98c682e531071b9ae6d9703d22

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_cs.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                b09754ee0b3048dc68584bfe0f631ea1

                                                                SHA1

                                                                87a2426414fdd52fc39679f6958379482ca3dde4

                                                                SHA256

                                                                9dcf2f8fba4c3bf4b194e3b27e5ef572e573a638d5c71e3ae4a154ddb62a91a7

                                                                SHA512

                                                                5d0d9b653184a41cff580683c16b4f67514bfa04987ee650c1d9ade4b12f5eb125fe44aa6e1a5e689423f62e755c460fc4886eac08c0e72fbd64fd9573212d4c

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_cy.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                7df1f9bf10766cba6f2b6d48e4dae8e3

                                                                SHA1

                                                                0008dbaa46d83ffe8d4a9d536a61a5109d74ca8d

                                                                SHA256

                                                                18827570bad9f879f6853438bcd0e379518531bafbfac2bb626dc1cc13711596

                                                                SHA512

                                                                bd8ee85d664c1480240e89c05d3639b5650aecb056263b75d7d37168bf6b6dada04145f42075e5ef0841efa9417880e8f9697e4ca71f20eaecfebd98e6b61f1c

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_da.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                0973e0fe9cdbb5133b27568795b7bf6b

                                                                SHA1

                                                                eaf2af3b576cffe390ef11c38a594a0a5880aa1c

                                                                SHA256

                                                                5772740a636254ee2967ca17a83d4b1b13934a4c2db7725115f8754a762cc734

                                                                SHA512

                                                                1a2346c569266085abef030a235ca83bc1e3249bd090823757495c71332546c6fc3692233415df9168b609820a0bca2ee22d8064e49c9c2aaf7b707e4f52c285

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_de.dll
                                                                Filesize

                                                                30KB

                                                                MD5

                                                                eadeb006461520d14aa2578af902773a

                                                                SHA1

                                                                f0a23049c073b8bb189dc38dc3d38c4603862754

                                                                SHA256

                                                                fe1573ff17ffd86d793aa1dd9fd36109961850bea883d2d3e6d8d3baa3a2e468

                                                                SHA512

                                                                608cd2b73f0b95a7b57f1e23e9da70c663fef20412c6612b58af953061b8c42c25b24d234b380cc86a5dfc166f3018a48aac2f5659434bd038d8a74a252bdf15

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_el.dll
                                                                Filesize

                                                                30KB

                                                                MD5

                                                                1a4700d41421d915d26ea36073467527

                                                                SHA1

                                                                3c657523c891dbff19676f1d3b471bc7beaa59f5

                                                                SHA256

                                                                0a6f96613229ffc6beb1b36c73cb52be4d68346fd08adbb89e95814ffdc78c6d

                                                                SHA512

                                                                d62cdcfcdb721bb72892a09763f6c97edd0a0b37123a8605d846b8ef8d09938d8c99c49f574e29f590d6528738ac92b8ba8c31cf337408434caf14716e790d57

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_en-GB.dll
                                                                Filesize

                                                                27KB

                                                                MD5

                                                                162af0ee7f6257765264df1ae5cedf19

                                                                SHA1

                                                                b25132643b3153c764ee9a9443cf2ae2fb476029

                                                                SHA256

                                                                982e2f99ab53b7325a3be510c50dfb01ffeed1bf2e291253c8ad9de6497b6c89

                                                                SHA512

                                                                8c615ab0942da4265238f16f0e71a5e095f07af654377d170370e885516b049a4505ec9e44f73f1ee70eca278da0d9affd4c4c3c660676134b634a995b4490c6

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_en.dll
                                                                Filesize

                                                                27KB

                                                                MD5

                                                                ca88ea1e6a8ee2379ea2c8459c2b99e5

                                                                SHA1

                                                                dcf468473aa7ece0f106ab34bd7ae633097153d4

                                                                SHA256

                                                                1e61386dff70de6dabc71ec5d13f8d77ae7e1ac7350f6cc7977603415f29c46a

                                                                SHA512

                                                                d51e59ceb1e99f771ae7f45c986f77f9471e120b27f777056fb12e3b6add87e2540b838cf86ff5fcb76794f4eb5d922c72410204baa5ca3635f4f6157efc20b0

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_es-419.dll
                                                                Filesize

                                                                29KB

                                                                MD5

                                                                d5f0c3f6a7f33abb613146888add7e1d

                                                                SHA1

                                                                01864e305dd70fbbd5aabaf5b9fb71dd235591f6

                                                                SHA256

                                                                d25b66f475c67394eed4c51c498f9e20dee225c3aaa9427281a2148cc760f46d

                                                                SHA512

                                                                ee4ad7416408b6fa5d07ed6b964101002de68d2a6e5206bbf5044c5d1323f8f3950e0d229f41b7b4c5389ff68deb890e5db1c2fbdd04c56dd247efe0648bb514

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_es.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                a86027b5da426647253679150fe41c6d

                                                                SHA1

                                                                c5e06bdfc88a39b95e65ba9552c7204da5268564

                                                                SHA256

                                                                ab508539ad80b32dfeb2cbeb57ef31467f0a79ff095d2ff892c17e80356a60f9

                                                                SHA512

                                                                45217ac7e913175416a5a6e446c4081af401e361663e1e99409779a6f08040a4fe08b116056ab7d112f6d1a71f97a6d5e53f22f9d986754f98d177f79d72b773

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_et.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                ab288e21516f5001b120a6129e8c6b6e

                                                                SHA1

                                                                00e93428692465d5874ca879bae9fe4a61debbe6

                                                                SHA256

                                                                a3a74bc891e686c5350bb763b75717f00d34f9281f98081e49611419c999acf7

                                                                SHA512

                                                                9e89a37d34ae04678be70ef4b0e83886698e067fa578b4acfa13643557b31c718172defac1053ced3c2acff3def2bcaa9ed40fba65ccdd96f37e46098d975fdc

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_eu.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                16c9a02f38925a4ebed9c1d1ba95f61b

                                                                SHA1

                                                                41d4e6d32bdcda0fe7f3c58253f2c5032cac346c

                                                                SHA256

                                                                da28ac726626540f08c4c881af38844108e2f878890316f588f62239f88bdc68

                                                                SHA512

                                                                84b544954553e198a1328968ac2bc86a9757d14dd4c304a1b4a55825d1d5dc42952fbd44df6c1c5951d95d430bfde78e60f750902c985877c6a6640c1aa3ab34

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_fa.dll
                                                                Filesize

                                                                27KB

                                                                MD5

                                                                532b88ef925118e43b4ed556c5fdfc3c

                                                                SHA1

                                                                5c4990ace3c1abd89802a4f5a06e4dd3aa1afa92

                                                                SHA256

                                                                a8fc095c422a0c0dbde18fcd8292402eff23371f79b4092fed0b7d3f2d4a382f

                                                                SHA512

                                                                f547a65a154b9ab942b185f3c9e4b55dd5771b6cc4442bdbb66487e47f1c631a987bfbb327b71a822b362ae5df5720549c1164e2e49825f4823ca7f3d5d6771b

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_fi.dll
                                                                Filesize

                                                                28KB

                                                                MD5

                                                                70d809ac0e74e6ae8ba2bfef150d6e30

                                                                SHA1

                                                                6d799af22f709cf7e1c0028fe994d27a17269130

                                                                SHA256

                                                                f2e9ce01e00117fabb74dafae001059b3c032263cbad7f9076f009da4a8abc1b

                                                                SHA512

                                                                927d7abdb298088953029fba117b095f26fccfd6c543201687e3a69b9c97ea90a657ee43d4f412fc633ff36ed80f4ac7b374763c7e61a222c76fd92e5cc66b72

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_fil.dll
                                                                Filesize

                                                                29KB

                                                                MD5

                                                                3cc0c1a7cece41adc97fff2f3366877d

                                                                SHA1

                                                                897a222da884641f32e374494b7348dd55627167

                                                                SHA256

                                                                565c9e8b60039a24e5bec0810917e64f32da727954b723dfc0be1983a0340957

                                                                SHA512

                                                                2d6f495cd9cf6d0ecafa41c37480e60f1e2ae1507e152b235a0e274f9db940810482224768490b3fa1193a926268fcab08c2602ae3167476b03ac4600fca96ff

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_fr-CA.dll
                                                                Filesize

                                                                30KB

                                                                MD5

                                                                85c1fd04d1b0bc0fa1e00559aeedd14f

                                                                SHA1

                                                                21b8a901a08a748f5c6483ab364c13a9a9ee6d79

                                                                SHA256

                                                                e7f16fc0c9060aa39521d2bb7c5f74e634c71a0f95ce62c89e018d8d1578b977

                                                                SHA512

                                                                824bb0be9c46e5074467f091b5cdb6968d3aa989b598d294932b10f254b5f0b4230da2ed86c9723068fb997b39d06f0ac3c67f98c0969227cb602e57603e9bff

                                                              • C:\Program Files (x86)\Microsoft\Temp\EU1042.tmp\msedgeupdateres_fr.dll
                                                                Filesize

                                                                30KB

                                                                MD5

                                                                1f446af97cc5b43c506505e07b0abe61

                                                                SHA1

                                                                3ed4be38abb4953d288d082578465b5ce92854c1

                                                                SHA256

                                                                10f6fe80963da0b757bde9781073df370be9b97301524838eac167787621118d

                                                                SHA512

                                                                d3215d7b15f2994a01b339053d976c8ad561b5324a9dbb269a5ac4668af917ae45dfe1c110855555c7855cf1c74ca38ec989beed91bb1d465c4304d888d6acf9

                                                              • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log
                                                                Filesize

                                                                145KB

                                                                MD5

                                                                82042a6b1491e42ce30e649341d07486

                                                                SHA1

                                                                480895c848ecd87d7a1140370e2b689ff983e627

                                                                SHA256

                                                                c6c97d0a4568c11da6a47234c2888d33ea1dea890f59feb4e6078c92d360a657

                                                                SHA512

                                                                5e6e7cf6423607c0c5dc8b46a7a3028d66730f3ff877b0153518bdcfda8c7e253bb98774c10c5b25060752e61ef4e83f82da4d1755fe52b13d0a6cfdb3bf28d9

                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
                                                                Filesize

                                                                471B

                                                                MD5

                                                                3855be0964beaf64379b70df36ca05f5

                                                                SHA1

                                                                1ed25dd6797cd4c13ca39bb578bc94491832353c

                                                                SHA256

                                                                3c391e1e53dbe0414de85f49f28b47c39ff49928f79e7f8941fca82f1a59151b

                                                                SHA512

                                                                e76b4f54adf725ca50441d58c27bc01817a4487513c67d3e84dc0fd788d8973333fc542aaac3fe3f852e495163b57a4c1622af8f7a88d22b6a87bf6916b43fdd

                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
                                                                Filesize

                                                                430B

                                                                MD5

                                                                52358a53353c5d905d3d606f8da2c3e7

                                                                SHA1

                                                                3fabeff40172cca9034b9a669f3373534b43270e

                                                                SHA256

                                                                9d5650ccfffc108263abc8a6dcdb7009feeee301ba740e5dc65bdfaf7ff17d60

                                                                SHA512

                                                                a2b392c6ea1f39a1ebc22eb0a5ab89316eca1160ed3be0e6384d849a351f778761811001d222579c7daf1d4fb7f14922b37ff91ccaf69a63952c40cb6d3df64f

                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
                                                                Filesize

                                                                430B

                                                                MD5

                                                                52358a53353c5d905d3d606f8da2c3e7

                                                                SHA1

                                                                3fabeff40172cca9034b9a669f3373534b43270e

                                                                SHA256

                                                                9d5650ccfffc108263abc8a6dcdb7009feeee301ba740e5dc65bdfaf7ff17d60

                                                                SHA512

                                                                a2b392c6ea1f39a1ebc22eb0a5ab89316eca1160ed3be0e6384d849a351f778761811001d222579c7daf1d4fb7f14922b37ff91ccaf69a63952c40cb6d3df64f

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RecoveryImproved\1.3.169.31\recovery-component-inner.crx
                                                                Filesize

                                                                1.9MB

                                                                MD5

                                                                dcb0ab396e869708ca1ca663c6697b50

                                                                SHA1

                                                                83d2d79250a470d8c140259688ee35e6019c60f0

                                                                SHA256

                                                                083c44f154565469a742fe081b09ab19eb5f2a986936dbcef55ddd21f79e6beb

                                                                SHA512

                                                                e598653b4e6fa16f7ca3a96b44cc279fb010555102c3b661a88e44f6750242e43293a54af25c187445a6f65f7979d556285c16a0294530978f97327f8c1bdd68

                                                              • \??\pipe\LOCAL\crashpad_4440_ISBJTENKTHPFLJVJ
                                                                MD5

                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                SHA1

                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                SHA256

                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                SHA512

                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                              • memory/392-265-0x0000000000000000-mapping.dmp
                                                              • memory/708-168-0x0000000000000000-mapping.dmp
                                                              • memory/764-158-0x0000000000000000-mapping.dmp
                                                              • memory/904-170-0x0000000000000000-mapping.dmp
                                                              • memory/960-204-0x0000000000000000-mapping.dmp
                                                              • memory/1372-151-0x0000000000000000-mapping.dmp
                                                              • memory/1448-172-0x0000000000000000-mapping.dmp
                                                              • memory/1452-285-0x0000000000000000-mapping.dmp
                                                              • memory/1564-266-0x0000000000000000-mapping.dmp
                                                              • memory/1592-179-0x0000000000000000-mapping.dmp
                                                              • memory/1692-201-0x0000000000000000-mapping.dmp
                                                              • memory/1712-268-0x0000000000000000-mapping.dmp
                                                              • memory/1796-134-0x0000000000000000-mapping.dmp
                                                              • memory/1960-137-0x0000000000000000-mapping.dmp
                                                              • memory/2084-278-0x0000000000000000-mapping.dmp
                                                              • memory/2440-280-0x0000000000000000-mapping.dmp
                                                              • memory/2756-182-0x0000000000000000-mapping.dmp
                                                              • memory/2840-171-0x0000000000000000-mapping.dmp
                                                              • memory/2892-155-0x0000000000000000-mapping.dmp
                                                              • memory/2984-162-0x0000000000000000-mapping.dmp
                                                              • memory/3020-181-0x0000000000000000-mapping.dmp
                                                              • memory/3320-159-0x0000000000000000-mapping.dmp
                                                              • memory/3360-273-0x0000000000000000-mapping.dmp
                                                              • memory/3460-281-0x0000000000000000-mapping.dmp
                                                              • memory/3596-177-0x0000000000000000-mapping.dmp
                                                              • memory/3952-175-0x0000000000000000-mapping.dmp
                                                              • memory/4128-153-0x0000000000000000-mapping.dmp
                                                              • memory/4220-269-0x0000000000000000-mapping.dmp
                                                              • memory/4292-283-0x0000000000000000-mapping.dmp
                                                              • memory/4344-270-0x0000000000000000-mapping.dmp
                                                              • memory/4360-279-0x0000000000000000-mapping.dmp
                                                              • memory/4368-145-0x0000000000000000-mapping.dmp
                                                              • memory/4440-141-0x0000000000000000-mapping.dmp
                                                              • memory/4488-287-0x0000000000000000-mapping.dmp
                                                              • memory/4500-267-0x0000000000000000-mapping.dmp
                                                              • memory/4608-164-0x0000000000000000-mapping.dmp
                                                              • memory/4656-173-0x0000000000000000-mapping.dmp
                                                              • memory/4748-132-0x0000000000000000-mapping.dmp
                                                              • memory/4780-277-0x0000000000000000-mapping.dmp
                                                              • memory/4812-227-0x0000000000000000-mapping.dmp
                                                              • memory/4864-206-0x0000000000000000-mapping.dmp
                                                              • memory/5060-143-0x0000000000000000-mapping.dmp
                                                              • memory/5076-166-0x0000000000000000-mapping.dmp
                                                              • memory/5152-203-0x0000000000000000-mapping.dmp
                                                              • memory/5176-274-0x0000000000000000-mapping.dmp
                                                              • memory/5268-224-0x0000000000000000-mapping.dmp
                                                              • memory/5692-276-0x0000000000000000-mapping.dmp
                                                              • memory/5700-222-0x0000000000000000-mapping.dmp
                                                              • memory/5708-275-0x0000000000000000-mapping.dmp
                                                              • memory/5732-220-0x0000000000000000-mapping.dmp
                                                              • memory/6020-186-0x0000000180000000-0x0000000180009000-memory.dmp
                                                                Filesize

                                                                36KB

                                                              • memory/6084-282-0x0000000000000000-mapping.dmp
                                                              • memory/6100-271-0x0000000000000000-mapping.dmp
                                                              • memory/6112-193-0x0000000000000000-mapping.dmp