Analysis

  • max time kernel
    170s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:38

General

  • Target

    a3856df71eb61ea894a02826e7ea581b042c79602ab859be3aad16f0a039ffbc.exe

  • Size

    1.6MB

  • MD5

    dc32132299c4239e0d54d9f1731dff15

  • SHA1

    7db45bd474049fc304172c57782cf5b2f3db8862

  • SHA256

    a3856df71eb61ea894a02826e7ea581b042c79602ab859be3aad16f0a039ffbc

  • SHA512

    6e8667cc95db7da46df710483d326d9035d83fa9e004b46fc598d4ea09f25063945fc53a4e05e08bd3e8c902069ff0aca866e1c699bab9bfcc4c3ac16442faca

  • SSDEEP

    49152:JTl2GRpauWfLwGUoOosLdc6Un/eDAzQJJpHjRYVhN:58GoOGUosyRlzQJbjRYV

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Mystic stealer payload 5 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3856df71eb61ea894a02826e7ea581b042c79602ab859be3aad16f0a039ffbc.exe
    "C:\Users\Admin\AppData\Local\Temp\a3856df71eb61ea894a02826e7ea581b042c79602ab859be3aad16f0a039ffbc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gF6xy57.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gF6xy57.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AJ4xs62.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AJ4xs62.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3920
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oi4rU85.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oi4rU85.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1892
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oh4qW83.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oh4qW83.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4008
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\xb8MJ19.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\xb8MJ19.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1748
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1OJ03gS8.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1OJ03gS8.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2888
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:640
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Ed8722.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Ed8722.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4864
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:3292
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 540
                      9⤵
                      • Program crash
                      PID:1232
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Bu08Fu.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Bu08Fu.exe
                6⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:3004
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Vt725UV.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Vt725UV.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4440
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:2988
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                    PID:2076
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5tc2Yj1.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5tc2Yj1.exe
                4⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2448
                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                  "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  PID:4648
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
                    6⤵
                    • Creates scheduled task(s)
                    PID:4524
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
                    6⤵
                      PID:1260
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        7⤵
                          PID:4416
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "explothe.exe" /P "Admin:N"
                          7⤵
                            PID:3456
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "explothe.exe" /P "Admin:R" /E
                            7⤵
                              PID:628
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                              7⤵
                                PID:1308
                              • C:\Windows\SysWOW64\cacls.exe
                                CACLS "..\fefffe8cea" /P "Admin:N"
                                7⤵
                                  PID:1604
                                • C:\Windows\SysWOW64\cacls.exe
                                  CACLS "..\fefffe8cea" /P "Admin:R" /E
                                  7⤵
                                    PID:2628
                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6Nf6cm3.exe
                            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6Nf6cm3.exe
                            3⤵
                            • Executes dropped EXE
                            PID:3720
                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7lb0sz50.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7lb0sz50.exe
                          2⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          PID:2092
                          • C:\Windows\system32\cmd.exe
                            "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\EADD.tmp\EAED.tmp\EAEE.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7lb0sz50.exe"
                            3⤵
                              PID:1800
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                                4⤵
                                  PID:5112
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffadf8146f8,0x7ffadf814708,0x7ffadf814718
                                    5⤵
                                      PID:2972
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9085527565343758557,3257319169692074599,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
                                      5⤵
                                        PID:4396
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,9085527565343758557,3257319169692074599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3
                                        5⤵
                                          PID:4124
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/
                                        4⤵
                                        • Enumerates system info in registry
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2816
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffadf8146f8,0x7ffadf814708,0x7ffadf814718
                                          5⤵
                                            PID:1888
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:2
                                            5⤵
                                              PID:2100
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
                                              5⤵
                                                PID:3652
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:8
                                                5⤵
                                                  PID:2320
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
                                                  5⤵
                                                    PID:3376
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
                                                    5⤵
                                                      PID:2444
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:1
                                                      5⤵
                                                        PID:5284
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:1
                                                        5⤵
                                                          PID:5352
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:1
                                                          5⤵
                                                            PID:5684
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                                                            5⤵
                                                              PID:6060
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:1
                                                              5⤵
                                                                PID:6068
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6448 /prefetch:8
                                                                5⤵
                                                                  PID:6084
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6448 /prefetch:8
                                                                  5⤵
                                                                    PID:6100
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:1
                                                                    5⤵
                                                                      PID:5656
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                                                                      5⤵
                                                                        PID:1424
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6936 /prefetch:8
                                                                        5⤵
                                                                          PID:4004
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,1049675685001595993,1938695986407558991,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7088 /prefetch:2
                                                                          5⤵
                                                                            PID:5224
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                                                          4⤵
                                                                            PID:216
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffadf8146f8,0x7ffadf814708,0x7ffadf814718
                                                                              5⤵
                                                                                PID:5088
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,1535348266719197156,17918757659308462951,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
                                                                                5⤵
                                                                                  PID:4080
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,1535348266719197156,17918757659308462951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:3
                                                                                  5⤵
                                                                                    PID:964
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3292 -ip 3292
                                                                            1⤵
                                                                              PID:1860
                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                              1⤵
                                                                                PID:2268
                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                1⤵
                                                                                  PID:5344
                                                                                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:2196
                                                                                • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:4568
                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                  1⤵
                                                                                    PID:5468

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    152B

                                                                                    MD5

                                                                                    fd7944a4ff1be37517983ffaf5700b11

                                                                                    SHA1

                                                                                    c4287796d78e00969af85b7e16a2d04230961240

                                                                                    SHA256

                                                                                    b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74

                                                                                    SHA512

                                                                                    28c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    152B

                                                                                    MD5

                                                                                    a774512b00820b61a51258335097b2c9

                                                                                    SHA1

                                                                                    38c28d1ea3907a1af6c0443255ab610dd9285095

                                                                                    SHA256

                                                                                    01946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4

                                                                                    SHA512

                                                                                    ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    1b9c1e40d10cc173321c7e19bc5dd0a1

                                                                                    SHA1

                                                                                    ff5c9942175d17ed8dc5e2cab1e05172e4b71a64

                                                                                    SHA256

                                                                                    13f4ae6a9902cfb4032947824872fc1a7da7957aab529fafaa90070fdb0ba1df

                                                                                    SHA512

                                                                                    b74400f557845303395e8d2ff424bd2d036e2b94f7cc3dbc61a91a804c5ce7dbe9964a9d30859de1043c6dcd3e4ac1e79da4e49f390edeefbf3fe408c1d6cde3

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    0402faa6921c6953c641eb7e1dc869e9

                                                                                    SHA1

                                                                                    11200f3fca30f690e11c513f9beda28aabbe689e

                                                                                    SHA256

                                                                                    10268175f9b20b42b8cfeef7e41775e698c33e17e0685825a8a1b51f172daa6d

                                                                                    SHA512

                                                                                    b967015e3a409b7673222965cd0027a0d418f67b29dd6d5908ed583bbfd0f5fb5a68c595358507fb19c623416dadf4426755d7047c22303ccba84ced28e5fd71

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    db1e4445ed4b34bedd4ba46844b00df0

                                                                                    SHA1

                                                                                    278f926c698cc7b0d6a832b79cc5bd19cfd7685e

                                                                                    SHA256

                                                                                    d84f8fd66df006e6380823d973b81407953c446fd17b024f2a766ac6c6eb4db3

                                                                                    SHA512

                                                                                    c9af0979d884115ae90d34f63f5c94318065229dc970437100ba8ac80669e83f35d14d9f74dfb28aa5f590265f4630b1820fad59d71eb194a4c3e6f644445c95

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    0010c036461745d3441730f2f04a8888

                                                                                    SHA1

                                                                                    31d8dd55e5b17cc102ce97f99020cfde48770e8a

                                                                                    SHA256

                                                                                    41a5f5af7fcf6aec269e0b9c89eb08cfc944cc216b74f86fc588fba53b6b42f5

                                                                                    SHA512

                                                                                    029b8f3ab10468a1d0c6cc310520515a7d977675964008b963220245aced143d09fb92666af65492b42230781746cda68e0271b72e0c72163f6d8e60b3325e15

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                    Filesize

                                                                                    6KB

                                                                                    MD5

                                                                                    5645b946e2edcf2b3726210ab03393a6

                                                                                    SHA1

                                                                                    b4e84e8d48c8703117f706a0717e8d1a5b4673db

                                                                                    SHA256

                                                                                    e57ad8316b4b2c18baf8261d5745bb691035fb024e695aaa49f41df4129d32c1

                                                                                    SHA512

                                                                                    39f50ded9f7c758c3bd6e306d6b909417a3110c6eaecdeb7a61297887b67c19f4118bff8d65bb01a30ad33d8bb5b25521135f05c11be10acda34b4077500d4c0

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    62dc6dea476f792466c6b1e9a1f4d7b8

                                                                                    SHA1

                                                                                    b3bf9f8c0362889ce1f598405ef833f95cd3f1ce

                                                                                    SHA256

                                                                                    803d6db768cbde5e1783f247dcea39e471697589ffb5fbfc9aa2e7689dd34775

                                                                                    SHA512

                                                                                    f9187b1720404e519f2c1e15468fe1af3ab016a94d0f90bfab1a919d35f04285fa4f98318495c75fef70bfb1465e69fa5621a1750bae3e9e048cf17060fd8030

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    f284506c4cca0632f98a1f7d588ce5c3

                                                                                    SHA1

                                                                                    77952022271d16c2d6e08f1839c56cb66de24a6d

                                                                                    SHA256

                                                                                    f10f4d81e9b3a54769d088f5a90196d9708bff3ec6e963f42f0b76063829793d

                                                                                    SHA512

                                                                                    367c67d0c95aab4e4fe5b4e35de2c1dcc0038f4733533aae4f3cd4be9f5588b34ae3e72181cc29c92ed14baecafba6317134a34fddd35f803c95ffbc31d81709

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                    Filesize

                                                                                    89B

                                                                                    MD5

                                                                                    073e3e786d16ee99fde86fb3240d6324

                                                                                    SHA1

                                                                                    82a9a12c8f316a1a2d416203eec278392395d89d

                                                                                    SHA256

                                                                                    5f27beefef0be128b8f961ac03cbffaf21ce827b50a923bfd947add5e3db8ad1

                                                                                    SHA512

                                                                                    050b1f4d845a0fc2970f6ad771b627ae369a57b9950da58a0ea6af2a5effcc0fcba11725eb4b090b7003905df6be53da57c199a44113142b6a7ec35c66554e3f

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                    Filesize

                                                                                    146B

                                                                                    MD5

                                                                                    e2349829ec51dac79d1989748a5c349d

                                                                                    SHA1

                                                                                    646707e9ae021ab4c00d0f90a88b9d953bc08db6

                                                                                    SHA256

                                                                                    a9124ba5b121d2a2fa8813bc49b8951976fbe77bbbdb904f7091209eb5bcf004

                                                                                    SHA512

                                                                                    0ee7ab1bc4c871c033acdca4de5c971cdf1b6773a1aafc5fea4a0fbaa35ff3b7a88de2236c12874cab8770c9bb44213cbd3c550a332f31e1a3d0ea5da91d8f18

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                    Filesize

                                                                                    82B

                                                                                    MD5

                                                                                    fafd6c6b3a71a1183c13353e69a5d417

                                                                                    SHA1

                                                                                    aeb2a808ccdc163f7c2805057c02b3006caac693

                                                                                    SHA256

                                                                                    2c27ff156c5e1bfb4a6e94b4cab5209ffe2dffde128692461052350ae54cb60d

                                                                                    SHA512

                                                                                    91bb319451375d96ea8bbf4d6134f988cf2c0737e39424d4b79c7712000a8d41ba8a0e6fa6150099249835650568ada0324d9b6d9735b524daf7970bbf07a3af

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT

                                                                                    Filesize

                                                                                    16B

                                                                                    MD5

                                                                                    46295cac801e5d4857d09837238a6394

                                                                                    SHA1

                                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                    SHA256

                                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                    SHA512

                                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                    Filesize

                                                                                    72B

                                                                                    MD5

                                                                                    8522324c35fb1e1164018d04e144f9c1

                                                                                    SHA1

                                                                                    3631bb324e50bf7bd913e6250b056d4dad5c3dd1

                                                                                    SHA256

                                                                                    79b4f8a22d7bb42a824122babcc51e4708d391191ff6a771284f12b1dbd9d417

                                                                                    SHA512

                                                                                    dcb49817fc6f5dc3f420aa32e08d75c41aa6f11423d54b569f441efd639abfe8f9c141cd91b13030f676ba5810f6c0f419a75187286eac6083a204878536a2e5

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe590620.TMP

                                                                                    Filesize

                                                                                    48B

                                                                                    MD5

                                                                                    b8a4b247d36f339ad038fbcc64882170

                                                                                    SHA1

                                                                                    bc20c6ffbc6a8be2f13f83439cf3242c36ede101

                                                                                    SHA256

                                                                                    7142cb4340c81ee2eb8f78aba2a619c4fb1ba7079cc340572e629ef3c0dcfb4c

                                                                                    SHA512

                                                                                    27eb4b998592e8c6477f65110f8f967e93c04cf3fb7379e841e9b57fd1d13808522410585ab146ddf87c2e9555c8f1b6a95767c8de534fbaca5d55597bab2d64

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    532a6c542591d7e1f3851372f7a574fb

                                                                                    SHA1

                                                                                    ce1662901c636e131c31ada623fdbde6cdf424a6

                                                                                    SHA256

                                                                                    01609cb44ccc89d63081d9008be860f645f84512662807c797fa711be62bd866

                                                                                    SHA512

                                                                                    d37a3de90e8cffd7e3435580f455b2b297b54f7e7a7cb39d5c35b138ec97125fbe18fcd555cbafc6e09d2c59a236154a047e6869cd245c8f0246b4cae72b07e7

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    508059426ce32de72020e72c0f30dedd

                                                                                    SHA1

                                                                                    a5e124e3cbee51fbff6c011a61402ad6c5a8d900

                                                                                    SHA256

                                                                                    226bf8c7563fdfa30eab008f48e2fb6a2b7c5bfa45bb516dc971b4399869f7f0

                                                                                    SHA512

                                                                                    452e6db3e6cfe9cf85b83d99d0bdd8e08fb9fa7973f7b96ac6f1ee12f3424c4603f344e69aa5e74e0deef569344a15dde015702a59793f9df752c2decb1d3447

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    90de6b87840f7f199f3e6004b08fd3c7

                                                                                    SHA1

                                                                                    aec5b7a82da9dd1a01bddb1145048ead12c35aa8

                                                                                    SHA256

                                                                                    8a07eeeb7f101b290c001d072e0c9692c4b7816200268334839c40c7fd95a838

                                                                                    SHA512

                                                                                    ce91a96ff115d22d0cb7a48ff4db64f824efb4053f4bdcd8e4ed2a9e520055a42ae1aa072c723f753c324378057453810f7f632e8390e720887cf1d15b9401df

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    8e903ba39942bcdc2035162cce9779e1

                                                                                    SHA1

                                                                                    9c4f070f41f273193eba70501c1c3fb46b97b026

                                                                                    SHA256

                                                                                    ee6e44ad87e3aff50ea4cdfc7fdeb85abc458e5ef2ada84009e46c475283c284

                                                                                    SHA512

                                                                                    f86603f185a5b9e0ba513df3d6f4f111fe55df2cfc794172371984d042646fa15954694cb1988325e72a9d22b8b3778adf79f656d13baccc3ded345f60025b05

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    fd9344764aa3d2516428222f378c2f2d

                                                                                    SHA1

                                                                                    818ece8f3174f87e0677813d8b5403fa6ff05b17

                                                                                    SHA256

                                                                                    b2a721bbbdf9a1a203cac312edfcc012c98da47ac3587bdbc0adc7e533a12a16

                                                                                    SHA512

                                                                                    c113cdc3d618d3791f557cc29bab72fa96cfbce071952253faa711036b96a2d6216b0e26427fae9f249935d89b0dff75d00df3a37179eb363da953990029f2d2

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    2e8961e83e7b6ed70178f60b4c98fded

                                                                                    SHA1

                                                                                    6e21997129a72ca63492993b0cfc068125b54e95

                                                                                    SHA256

                                                                                    994454424048af9bb2aa64c5d77a014e3678f6d3054f6544b8e783f3bcc3305c

                                                                                    SHA512

                                                                                    4d7edcc51cbfe44a5a26f2e85841aa2f5699d22121956ffd014b1ec9ce03741bcf7e2a995ad955a7381ba5bd93dfc08b1a191539933861d979233b4a49d7d11a

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe588160.TMP

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    e0c81b5c221819022d3414b4de1ed465

                                                                                    SHA1

                                                                                    ad32b55d765b3cb5479e2dc9b3ca34d7715d19d5

                                                                                    SHA256

                                                                                    10768cd438fe12a98739f39478ef1097a1f15e1b38b501af9176246915fc9e0b

                                                                                    SHA512

                                                                                    5c363f2167506ab79e02f1914ce14e3f97018ed4b054aa980071f5ee6a9d774e72f1fb877bbf582be88355726b17edf312398f2c92d2a9dac46958ba0a060eae

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                    Filesize

                                                                                    16B

                                                                                    MD5

                                                                                    6752a1d65b201c13b62ea44016eb221f

                                                                                    SHA1

                                                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                    SHA256

                                                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                    SHA512

                                                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    892f4bf09eef9e3bbbb9d4e2a8935ade

                                                                                    SHA1

                                                                                    7e50279d3b8ce2c0231c3dd41a1374805b935a73

                                                                                    SHA256

                                                                                    9821a8795dcfa47f549cefa46930e3501b975f4bf8ced039ecefbdec89a41c1a

                                                                                    SHA512

                                                                                    7d3577b0a09b851348a6cd8aa7b421c6983f486bd38d85947db8bb7015212eb59f2cabadd5e53a2418475158a68334dcdfb3cecc2d230716d0b6113c8db246e0

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    b9774bcc63e825c7297f8c7c11545ffc

                                                                                    SHA1

                                                                                    bbe687d71b72c1593df501f644868c1c1af4b514

                                                                                    SHA256

                                                                                    8a3487a95cf2986bcbe5f51a7a95012ed194b0c849e8188620428054559174a1

                                                                                    SHA512

                                                                                    896c66591a2566190877c31848ef9d2efc6b7db7fbf2428d639ed4b6552359791987e292722e1eab94f696ffc0b0ad0cc60b7d321bdef9ffdf3eef474d5c089f

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                    Filesize

                                                                                    11KB

                                                                                    MD5

                                                                                    8e7b739095e0cd8278f9c1a3fa5a600b

                                                                                    SHA1

                                                                                    92abbadf3d39d1afbd612d6f70b10ce368f60b73

                                                                                    SHA256

                                                                                    7e62127843112e070bb87478cab6aad99d9f61024e7cb765bc1df7f03978e340

                                                                                    SHA512

                                                                                    1eec8a86980a944485e47546f3d3b938dfc4b7dc48fe5096119ed73861d7e772f543af1ca235fd2f9089d5e38de0f5fcccef6ea636689a6e308257ba8ae9f2ad

                                                                                  • C:\Users\Admin\AppData\Local\Temp\EADD.tmp\EAED.tmp\EAEE.bat

                                                                                    Filesize

                                                                                    568B

                                                                                    MD5

                                                                                    bcbb9cb105a5466367c5f6ceb38e614a

                                                                                    SHA1

                                                                                    be7f3382e1a4a78428c8285e961c65cefb98affb

                                                                                    SHA256

                                                                                    878c05348c1269420ec01dd070212589b5118eba58a4592f89fc36b2a5860d8d

                                                                                    SHA512

                                                                                    efed12dc71ded17bde4a2f7849ef77d80db75d29c52351f6338f4a9ab5d8b42ba7b9fdca7eb472866819749587f79eb3c6b73e0398f4813b51f300d9a65b0fbf

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7lb0sz50.exe

                                                                                    Filesize

                                                                                    87KB

                                                                                    MD5

                                                                                    c90063386390671a7103b1ddd11d8923

                                                                                    SHA1

                                                                                    1a7d4f81d424067a3f565a15477471a893da84ff

                                                                                    SHA256

                                                                                    676c0e79d68e176e9240bd8046a56092061afaf2789cbbd25073801a785d07b4

                                                                                    SHA512

                                                                                    90b28665fff4dfa3cfc2a3bac7b50131e048d0fd3241ad51f7800644299560b4f306c09356538abd7c4ed2f7d834079114d44f1ae8117257e5a4b0dc9c7028ab

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gF6xy57.exe

                                                                                    Filesize

                                                                                    1.4MB

                                                                                    MD5

                                                                                    930beadc75ed80065324e8f8063cf8ad

                                                                                    SHA1

                                                                                    2ecf437dae87a2b9645d6562c0488e8ddd8f485a

                                                                                    SHA256

                                                                                    923ea2cc7717ff5dc23dc9f990437179ccd27b0e3952aa697ef5a195510b1234

                                                                                    SHA512

                                                                                    9cba6a2272659d0a159ca8fe3b450ab8353ba809a9fd5ec7ce7acaf176baf36b998836301fd35f93b750bcc3eb646287fc52f9cdcdb39a3e4eeb800975f48a03

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6Nf6cm3.exe

                                                                                    Filesize

                                                                                    182KB

                                                                                    MD5

                                                                                    9cd33125db575ea280638ccec324fff6

                                                                                    SHA1

                                                                                    fe3317cb91a1887773bacb73b61859ea9a47f7d7

                                                                                    SHA256

                                                                                    6bc93c5af6b77075afa4d7e42e9fb6e35ecc908e377c2cb673b21f7fdfb590ae

                                                                                    SHA512

                                                                                    244b113d7424ca1e1cc6df98ada25a5b63a201624db8fbd9e769468c1c8eedd36bac6a85e59231dacbc357ec355209d3d4b8f52b540994f4693592022f8ca143

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AJ4xs62.exe

                                                                                    Filesize

                                                                                    1.2MB

                                                                                    MD5

                                                                                    7989bbf8a008e02a46f34fb509dd4acd

                                                                                    SHA1

                                                                                    f7dbcee7367b26511239a7c9a953888cfb3f4592

                                                                                    SHA256

                                                                                    221d9a242bdf3f06596d2cb045290031d78732be19bd38d60ac2dd690cb0da7d

                                                                                    SHA512

                                                                                    623de21092e345bc359990804cb3710a5acc308ffbba8d79001a9e4b6235b936ba4859dce505f054de156cf5354f03f475504437d05129d004b45dd56ff9d0d7

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5tc2Yj1.exe

                                                                                    Filesize

                                                                                    219KB

                                                                                    MD5

                                                                                    032e3baefbf45911d51a0588cc2bd2cc

                                                                                    SHA1

                                                                                    c40fc42097696a0f8f36fac6093f6c86ea48deba

                                                                                    SHA256

                                                                                    0807d61ede8efc08999f15943a89c1d32e6ac61ed9c37e6e9aaf408ae0d0c715

                                                                                    SHA512

                                                                                    78e3a551cf0e334f23fb72844b4662edcf97928db77cc08bfb50e2e2dc7605d786dc7163e5003ffbbe3eb6ac5a23da5007ed4ed21bdfbe72db42448747cce0f4

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\oi4rU85.exe

                                                                                    Filesize

                                                                                    1.0MB

                                                                                    MD5

                                                                                    816133baa4571b2cbbc3e19736c15144

                                                                                    SHA1

                                                                                    dc088002f3825bfc888d3d6c7e0584b02564ffbd

                                                                                    SHA256

                                                                                    6e4f256e86c0f1067621a8c6087b5809e76519e0da77e4c22dc93c101f013c7a

                                                                                    SHA512

                                                                                    ddc0160f2eb11567a7d5fdfda523532a75c85cd55831613364212d7441273486c2629c37827e85ea3590c47b52e386ac5dff112e4c19b719a9b4f8085a500c42

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Vt725UV.exe

                                                                                    Filesize

                                                                                    1.1MB

                                                                                    MD5

                                                                                    d05f75bbd1acc780a6052b7e06aa00cb

                                                                                    SHA1

                                                                                    ad67dcb35d31ab4b7b84a39af2650011e0d2108a

                                                                                    SHA256

                                                                                    71ee44f9d803d429e8dc1ba5f9b1e81080128f18bd3fed914f313984be13ed58

                                                                                    SHA512

                                                                                    b412c802af1632585522639f535a19b919bb5595d8575a5b807ac0735d2cabbdf6e6894f2b74226839ce6f641343ea94ac176b38de7108d93875c5aa8b1a125f

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oh4qW83.exe

                                                                                    Filesize

                                                                                    661KB

                                                                                    MD5

                                                                                    7e07d1fbcfbfd08b7e333f9fc4557679

                                                                                    SHA1

                                                                                    7173b1fb238f9c13d3a62b6ba89b69f471894ba5

                                                                                    SHA256

                                                                                    cf3ee7c1d5728b2505309271ac1a990a528acbac4f1160084c72ca07b8d834ad

                                                                                    SHA512

                                                                                    0fdecb3f875fdb3265bd72b7c04b651ede88cc356c29ba2298b3bf52885f6dfec643223cba8118bddef99cedbe5f6444296876935c545e9f2c1750d88717d2cb

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Bu08Fu.exe

                                                                                    Filesize

                                                                                    30KB

                                                                                    MD5

                                                                                    db0fd527bee067107516283d41c79ad2

                                                                                    SHA1

                                                                                    80e40d0814127c38a7e429024d91cc07ae9197ac

                                                                                    SHA256

                                                                                    cc13ddac59cc37c169830ab9ed238ecd0cd8ee6f7aa9d0f87e045f6a116b1bc2

                                                                                    SHA512

                                                                                    4324e2a890b64bf78856cdb87f12128c689e5234564060189e0a3e678b450a05f460adf7b0e54dc52619548320a3c2a93734daf3ecf80541e7dc6b6f50093852

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\xb8MJ19.exe

                                                                                    Filesize

                                                                                    537KB

                                                                                    MD5

                                                                                    91b2b4d9a8750f0339de4d9858edafcb

                                                                                    SHA1

                                                                                    4443a0aa88112eee79e6205296b9606d94d0c8bd

                                                                                    SHA256

                                                                                    9086cf986d6aac3fb07f915f53641662202079043fe8dd57c62a5f55ff3aa0e0

                                                                                    SHA512

                                                                                    35833b1ce1f2404591fea43101cc686aa68594d49519e4aa9f2042793d825e92e807db756826a355e6cfda374bf0183c9d4a8642ac1c84187d3c56cd8eb8f3ff

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1OJ03gS8.exe

                                                                                    Filesize

                                                                                    896KB

                                                                                    MD5

                                                                                    31dc50bb7773755a0b527415d04064f2

                                                                                    SHA1

                                                                                    ec2d24de207ce4f31bac02db633e1fa308173c58

                                                                                    SHA256

                                                                                    b59deefdc1962e108c7c124acab2bd04c57436e09ddeaa67d521a5403c10d2c3

                                                                                    SHA512

                                                                                    333d6e21de76a52b0e7a8e8609bc444ef02b714ba4bf66786485796a24b4fefbd9ce4251d4c5417a2df4f7fc8b46b2333536142d305c4d3a63bbdeb6c25695e7

                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2Ed8722.exe

                                                                                    Filesize

                                                                                    1.1MB

                                                                                    MD5

                                                                                    c06700c439a72b10b23e026bfca47cd3

                                                                                    SHA1

                                                                                    4ca0c5bfbd727eedda54e8fff8f72ed2d3d9e7c8

                                                                                    SHA256

                                                                                    4b5ab8a084f940289fd6175a706c21bd3374ad62b097a106c9b96b103ae6a131

                                                                                    SHA512

                                                                                    a14e9c4f0c21f37e1f7f008b3d467fca1c05852ca6b7fbf7db6f2f4e2e71c9da541a5e0f97fc2ca6b76fd9f177ca81a0ac6317006927528c3334abeb244fb15b

                                                                                  • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                                    Filesize

                                                                                    162B

                                                                                    MD5

                                                                                    1b7c22a214949975556626d7217e9a39

                                                                                    SHA1

                                                                                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                                                    SHA256

                                                                                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                                                    SHA512

                                                                                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                                                  • \??\pipe\LOCAL\crashpad_2816_FZLASYDPESSAJXVH

                                                                                    MD5

                                                                                    d41d8cd98f00b204e9800998ecf8427e

                                                                                    SHA1

                                                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                    SHA256

                                                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                    SHA512

                                                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                  • memory/640-110-0x00000000746B0000-0x0000000074E60000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/640-42-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/640-46-0x00000000746B0000-0x0000000074E60000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/2076-90-0x0000000007C70000-0x0000000007D7A000-memory.dmp

                                                                                    Filesize

                                                                                    1.0MB

                                                                                  • memory/2076-72-0x00000000078D0000-0x0000000007962000-memory.dmp

                                                                                    Filesize

                                                                                    584KB

                                                                                  • memory/2076-245-0x00000000746B0000-0x0000000074E60000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/2076-93-0x0000000007B50000-0x0000000007B9C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/2076-92-0x0000000007B10000-0x0000000007B4C000-memory.dmp

                                                                                    Filesize

                                                                                    240KB

                                                                                  • memory/2076-91-0x0000000007A80000-0x0000000007A92000-memory.dmp

                                                                                    Filesize

                                                                                    72KB

                                                                                  • memory/2076-89-0x00000000089B0000-0x0000000008FC8000-memory.dmp

                                                                                    Filesize

                                                                                    6.1MB

                                                                                  • memory/2076-76-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/2076-86-0x0000000005390000-0x000000000539A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/2076-257-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/2076-71-0x0000000007DE0000-0x0000000008384000-memory.dmp

                                                                                    Filesize

                                                                                    5.6MB

                                                                                  • memory/2076-69-0x00000000746B0000-0x0000000074E60000-memory.dmp

                                                                                    Filesize

                                                                                    7.7MB

                                                                                  • memory/2076-63-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                    Filesize

                                                                                    248KB

                                                                                  • memory/3004-57-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                    Filesize

                                                                                    36KB

                                                                                  • memory/3004-54-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                    Filesize

                                                                                    36KB

                                                                                  • memory/3292-51-0x0000000000400000-0x0000000000434000-memory.dmp

                                                                                    Filesize

                                                                                    208KB

                                                                                  • memory/3292-49-0x0000000000400000-0x0000000000434000-memory.dmp

                                                                                    Filesize

                                                                                    208KB

                                                                                  • memory/3292-48-0x0000000000400000-0x0000000000434000-memory.dmp

                                                                                    Filesize

                                                                                    208KB

                                                                                  • memory/3292-47-0x0000000000400000-0x0000000000434000-memory.dmp

                                                                                    Filesize

                                                                                    208KB

                                                                                  • memory/3364-56-0x0000000002A40000-0x0000000002A56000-memory.dmp

                                                                                    Filesize

                                                                                    88KB