Analysis
-
max time kernel
101s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 15:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://twitch.tubson.pl/
Resource
win10v2004-20240508-en
General
-
Target
https://twitch.tubson.pl/
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in System32 directory 11 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 5 IoCs
Processes:
mspaint.exemspaint.exemsedge.exemspaint.exemspaint.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2804150937-2146708401-419095071-1000\{1C432653-DFFF-4CDD-8E5E-63357620D583} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemspaint.exemspaint.exemspaint.exemspaint.exepid process 4720 msedge.exe 4720 msedge.exe 2424 msedge.exe 2424 msedge.exe 784 identity_helper.exe 784 identity_helper.exe 1092 msedge.exe 1092 msedge.exe 5736 msedge.exe 5736 msedge.exe 2040 msedge.exe 2040 msedge.exe 5856 msedge.exe 5856 msedge.exe 6260 msedge.exe 6260 msedge.exe 6712 msedge.exe 6712 msedge.exe 6924 msedge.exe 6924 msedge.exe 7112 mspaint.exe 7112 mspaint.exe 5436 mspaint.exe 5436 mspaint.exe 6388 mspaint.exe 6388 mspaint.exe 2340 mspaint.exe 2340 mspaint.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 5884 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 26 IoCs
Processes:
msedge.exepid process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
Processes:
AUDIODG.EXEmsedge.exedescription pid process Token: 33 1948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1948 AUDIODG.EXE Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe Token: 33 4312 msedge.exe Token: SeIncBasePriorityPrivilege 4312 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exepid process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
CredentialUIBroker.exeCredentialUIBroker.exemspaint.exeOpenWith.exemspaint.exeOpenWith.exemspaint.exeOpenWith.exemspaint.exeOpenWith.exepid process 5300 CredentialUIBroker.exe 6612 CredentialUIBroker.exe 7112 mspaint.exe 708 OpenWith.exe 5436 mspaint.exe 5884 OpenWith.exe 6388 mspaint.exe 5372 OpenWith.exe 2340 mspaint.exe 1772 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2424 wrote to memory of 344 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 344 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2548 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4720 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4720 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 4544 2424 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://twitch.tubson.pl/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe92d846f8,0x7ffe92d84708,0x7ffe92d847182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6752 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6756 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6992 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7176 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6760 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7128 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8688 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9024 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8216 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8924 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8236 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8656 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8620 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9244 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8936 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7024 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7700 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7576 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6760 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,3688742968158461734,2145952399508397928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainer -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\CredentialUIBroker.exe"C:\Windows\System32\CredentialUIBroker.exe" NonAppContainer -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\misiunia (1).png" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\strarzak (1).jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\strarzak.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\strarzak.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001Filesize
101KB
MD518926a50b524d135cc4f137615daf6e9
SHA1f185d23023a9efdca1aa28831858d4a84d2c3be8
SHA2561da43d3b1ffbe7c8b8d20ca7741bcac54e0283a247171cafe6f0775b69fea774
SHA5127cf9927808582a0c87b651a8e36ad6f044fefa4cd72104ca7bc9a2f4c50ae354054fe9b48aafef5c177d17b19ac2ef22f1508ddbe137d892c920632621229fbd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000aFilesize
1024KB
MD5beb4c506e6383fae649cc6c37bb5f02c
SHA1590deec7a5a74fe4020c33a481257e34f1e5c35e
SHA25636e58ad2c8b57c91f9f64e3023043a6604f277c0220921201cf98b5e3e323c36
SHA5120f6c1e39a4d3868c7e223073755e54de9b4264a42964c9e10f944217931d7d838304fa7bdd71043a65d8b5c26f89f54cc64bf6405b50cceef0cea35ceccf8032
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001eFilesize
1024KB
MD588e226426ed2d40e9cbf9b82c32e39a5
SHA14c36dec4db809bd68ab11c52a62f20d82184d18a
SHA2564914f1c91ec925fa41dae54e1ae783788e542f8e677b471e2092438b07eb147b
SHA5123e9ec8484975a17bb993dc77381981c0b2da52093441b99b4593452a95b28205e2a1fd028a212ffdd9fc0e5ccfabd4265ef2403015583fc4c7e83243c6034151
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\0d2738c0c1176629_0Filesize
260B
MD584cbf24ebf8b0b31b84b9666d13cfa37
SHA1038096dd39d13e64f303ca2cf8bc348d4a5630b3
SHA256813883459690df42af21c275905c60e33e18be766dfc193c003aa5b3085adbcc
SHA512556ac33ec6f055221bf330582538d388869ccf1ed432375a4808842b53677589ad58a01f60913277d60e753800c0baabc87ed5df16c18a26d818fe82ffa8380a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\63db904b4346fc57_0Filesize
453KB
MD5ad88598de09cfbb900450efe96d4f18b
SHA14aa87f8a51a5829504b4a40971a2815aa61fe769
SHA256a33fcd616ce91a207434e4488148787c63b4a70604f5df6f4edf9c0172c0dba7
SHA512a6cd6d7188e53032531b06007d6722639b48cde458a1e31f1ff933469cc287506cb408cf5dae812936efca2dfb805ec9961f50a8d83d5e6e061f86da6129ed0b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD53ace24328ab80fccfb04802cf1a882f6
SHA1652529f821fd351332d919b8425e9e4eb9188ed7
SHA2569fef343b8c479a4b8a0e9306e2987046ca9de4674841f426ea9e89b2a0af2155
SHA512eafec04ec92da1f86a024b1f3538718bf6b73c1602397c74a99f2b7ca5b2b3510dbf2659b5f4e3bff96ce1167a03cf6904ef6a52034b7e960775ab445ac0b483
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD55c68e5c511322877223f9ce60253ed93
SHA14e8fb18427a3d4314d9f8af7ae42ca13f6662e0b
SHA25625f9f3c78b4ccf985417ddd32e402a2a2d1106784fbe6cada55502f8330f4edd
SHA5121375f88e1ae693259b8918be7c835aa569d20639bd87feff98ea1a1c50d4bb03089534f07ffb60abf1b3e19314e88aea0f8b2d7cda49c1b8faa70f89c36c1900
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD5a7aac4b9afd42f79fe60cac4ca65238d
SHA1b9f1c7de47262916e39ccb2557c4a5275be0e76f
SHA256088a4a19b58dc904f81acc19ad9c0216f2cace1c68d8f0b2f315e50f8187e072
SHA512be3516e3ade5d1bbd3cb468122db9f273cb07484e7bf48172e5114eacf58caa9a7d80dfc9aab22bc156f0eab218540e2a1166c169ec38f64a9e86dcc6e474edd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD55a178c75f7336d50fc634dd5f0fa4468
SHA1bfb499b178eb0ddd467a275e3d35b5e939260038
SHA256cc365039ccef1ffc8eaffffeaf04d75780de1e7c61b7b1b0884a852c85777c70
SHA512be34606f73a166413cc0922434f4d172b8fbcd8828f3c735a50bc007d86344820e0231a8d995a587d0b538a4603bff235cd965a1ff5899d22be8751a94d363c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5318749eae85c45c17ff90b29c82ce723
SHA19977f16ed9520387a09d7dfdb45e4d776288fbf1
SHA2561f573c519519687aed67aa07408c0cf8c7edcb04755d429dd7c8ff6cb5a0b41e
SHA51219760b570ad7924fd7ce48f50a4c452520ad083d1f4a4f29e5f49934a0d7f769c535bfc1cec83dc6cde5a73715e86642fb24c81c45e914dcdee2a4c00363eca0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5b377a4e2a01b2c86ef3d030cce70109a
SHA1cafc72012cdfafeb2a29021bb49b086c90405b85
SHA2561f0e6730f0d55efade56f137b72f83a2279ff220c32f4dc7fa99f693354c34bc
SHA512a5645e038d3fe3e34a32e39d66401d86c8cc729f854147635c057d7572e061f223ca649c0c93a3898a221a77b43f1a0cddf899007ac1066c6335527fdbc607ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5b87599333520292c6af02dada332d454
SHA12698691aeaa1ab0779ea856dbce2a183bb98a661
SHA256a51da07116e12d26944d7fc3b51fe733a83af52ef5b06dd62b85d39589f61e16
SHA5128421de0f508b3f761ba53063d5870ee63f223e45467db8ce3fb75b03ef4aeb1b9ac0f2cf7adee378f26ae6076c3e7ea198c3e9506bab6d8cdc0d5f80e9e1f649
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD55ebf5f7cd0a9d19cabf6f8b10e42df46
SHA15efbe3a6f51b35da34c3fb78f8d5bf525cc69052
SHA256e8c7512840597993143f7d5d7f975b170c118e5a572646e81cef07a95ee3426a
SHA5120ed736fb1652cbebb5bfe85f28f81e6773215fda90da8581ff862f2f013dceefcf240d18e97bfa1498ecf45615b7e54fe81d4f0448630e8a3190b30c341ee1df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD549190a2fff214c863d543dc27a6b115a
SHA1626cdf6c7011c981c4ff26a2f9e6742904979946
SHA256d94ca0a00a23eb39b398210dc503fff654fa193f61e51ffe7f4005c551c99a27
SHA512dd96207a9b4f6ae5adaf2c76d40d8fb0d4fef5aeb8920ab016f8ce4c1ca7145a8a51576c8bd9a9a0004435e98706de60b637874a55fdb433d2f74f6c474e2884
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD5fcc4883288b883ff6b00d9178a2e5377
SHA1756883b2fd2160c1c2be1dbb840cbf1b819eb5e9
SHA256a79e8d2fb62fa27528bbef3658ac8f590b8092b2c291371f2bd17805fa2933f1
SHA512db14013ac2ce7c712779b9e2dddc371f8894120facda30fe94fc8e2b0bf09013541a62f6f36cd06d7cbab2acd40b8afe3ba892f4648ae6fa201b7666f3d62a0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD55703d46866922468bbecd1516a61a70c
SHA11785b8a1bb235760f31cbeff9e7b6d4a46ca5d64
SHA256c805521c2b3f826d7e29b85548dc3a40128cdfbff4d7eea15674e079c02f83ff
SHA5122861592bc66f6e4dafc77b92c9f661d76c1dfeffa7414845f7f860c136aa585e3da1580b2d54055607afaaf9c3f9a95d3fe12ba60509cb0a7167a0a5c67ed97e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5324179023c631360dd5ceb06aa4aee64
SHA1769768f5091d4fb0da2e92fc182d1013003e0858
SHA2563bea9f4a20002e9ca79c2470fd7273b76ca3d665e6baa33054bd05a51823468a
SHA512e7704bf6be99f03bdb7b2a6f4a1641b074e23c8cf31ebad8d3e25cdbd13fa00ce805635ff1310850d64928dead9a909a57df526e4d32cb13eb85cbd2445cca72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD56c8726abd7c3833a68eaab5879ef870f
SHA128aec43846f5c42b840a9872322d138f38e6148c
SHA25673737e985f07ce76f63d4c28d246719adfd949103951fc005f133e1b4dc3aeb9
SHA512aa78687830463c188b5eca05d1721ae6aa783cb405edc129b08e73e07ae89b1b4c27a880ab9bd657f94547a8ea86564044728aead1226ef1f256ced0217d1ffc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD592fcf2eb04fd8c1a9e4a8aa93cab6e7e
SHA1145ed9087341bf90b54b2ff130ca63f698a40c4e
SHA256a3d53c007882fa2ab802633f7408e8b000248b21e2ee99edd63a65f1988febc1
SHA512a13a5f440e74a82b8d3ff3a9518fe388bced97cc3c272dace1127621cd17cfe1e2992755036f12343d5b5858c2f1d8fa6645680e4b69b6ca120ce9c512ebfcc4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD5fea4fc182c61dc745855e8662e59769b
SHA156972d7423e8b8db4276fa6b9062378c5db3b36b
SHA256aab0d6872d8d48a3c13d8dfd3d322c2e6bc1deed3f2c6e200336f198c9657ad0
SHA5122c96aa5fbc94748cded8a079ad90b4a4f9f8d1127103b0791bc18fd09809b68cc840f8f909a3039a563452c02aeb5cb9cd0bf68298777b1434ba75de1fd6d07e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ad38.TMPFilesize
2KB
MD5eecdccb715b6687c92de27473a8edd77
SHA1582443b47c38baa5d8514d151ff02d1116f530a1
SHA256b0f306e02184ff10eb0b19cbb38196cfeb8798eec2ec81e7dfcb92c84c08f9dc
SHA512420ff8210a16be37be0957eabf1c8319c806d35c175e39e559273d03b3a17c96b3f3d45710623459a3d394b6c6c0bb1ca163ee307beaf4019b603c26a5da5b53
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5c6355a01dc005542d6d6b17a1dc247a8
SHA14507734a9f7e7466f5e47cf3eb22c2edd8d19057
SHA2561fad98bed62afffb8f80f118a1c81d1606bd3d9893f1d3d3ce7dd2377f6c37dc
SHA512c793e372892bbd5a94c5feead7a733ea71a66e5ff24b32663dd4c2f328702123a00ac15153723ef0a280250c4597732b6f2f3545e7d2532ca84120d4a36cc2ff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD52b5565265dc1adb228cc2b882d644a0e
SHA128caa8fa47dbe8ac8cbbc5c78cf0467739dd9a58
SHA256b4bfbcbcc62a9c9e5ae6b7dcfee612b32deb99de7eaf67b61864c5e76fab2606
SHA512e804dd11ceb27e868d72bf2518178d370f199b796d3d3cf424c51ad2beb5a700fa3d74d8dc7bceb76875ff7cd6061568f22d78e8811df06816bce76ff7336543
-
C:\Users\Admin\Downloads\misiunia (1).png.crdownloadFilesize
1019KB
MD543b7d00d896163d58530c4d28ed0bcc8
SHA1f26617e69b227b8a005fe47c4ec8d0e3e0343945
SHA256811f499c7f4136351c3f38fd9ce9172f65e875f50c50fe9f05f20be9ca4a7c6c
SHA5129ef73895f99c39765acac64844a83d5d8131edfd884db66564e5741c54e53d5f1199655e1201a8634be7304c1ed675aabe10993f9b15e7741af4b9710a65f680
-
C:\Users\Admin\Downloads\strarzak (1).jpg.crdownloadFilesize
38KB
MD5a8939ad47e35a55b335866db9f9521f2
SHA176c89d1d3a155223329f2fd365b16ad4fb568c4e
SHA256906c2e9907a958108edba7e49bca275a502b9e574b5167ef719fa970d9f35a39
SHA512ea1a69aa79c3db72fd1dd3af450c37447dfc603f2b7b58c88eb85e079aff5489cda51d466e7fcd7a0dd088d506c057b5338b299aaf25fc4779cb69a273850c08
-
\??\pipe\LOCAL\crashpad_2424_BDZPDFARVUFILRTYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/6840-719-0x000001B1710B0000-0x000001B1710C0000-memory.dmpFilesize
64KB
-
memory/6840-715-0x000001B171070000-0x000001B171080000-memory.dmpFilesize
64KB
-
memory/6840-726-0x000001B1793A0000-0x000001B1793A1000-memory.dmpFilesize
4KB
-
memory/6840-728-0x000001B179420000-0x000001B179421000-memory.dmpFilesize
4KB
-
memory/6840-730-0x000001B179420000-0x000001B179421000-memory.dmpFilesize
4KB
-
memory/6840-732-0x000001B1794B0000-0x000001B1794B1000-memory.dmpFilesize
4KB
-
memory/6840-731-0x000001B1794B0000-0x000001B1794B1000-memory.dmpFilesize
4KB
-
memory/6840-733-0x000001B1794C0000-0x000001B1794C1000-memory.dmpFilesize
4KB
-
memory/6840-734-0x000001B1794C0000-0x000001B1794C1000-memory.dmpFilesize
4KB