Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe
Resource
win10v2004-20240802-en
General
-
Target
d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe
-
Size
1.8MB
-
MD5
98e3a98d783ce899483ed33986c6c771
-
SHA1
cc30a8078b4cf4e9bc3326104951c19736814811
-
SHA256
d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2
-
SHA512
0ef8ddec52f2e17927e43979bee82cbb00366941b1aca4b31a2913b4d054ac4858538e04fa2f4fc889fc6747f26da22657d0cdaa0f2528fa538963e0e2b6daf1
-
SSDEEP
49152:RtiyzRRNuSAFzBx9DHLnms2GxgydPVZTrPTMXsregN:tRRNBGBj3YGxgyyXUB
Malware Config
Extracted
amadey
4.41
c7817d
http://31.41.244.10
-
install_dir
0e8d0864aa
-
install_file
svoutse.exe
-
strings_key
5481b88a6ef75bcf21333988a4e47048
-
url_paths
/Dem7kTu/index.php
Extracted
stealc
nord
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90f3211e4a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90f3211e4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90f3211e4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation svoutse.exe -
Executes dropped EXE 5 IoCs
pid Process 2676 svoutse.exe 448 90f3211e4a.exe 3432 db97448fe5.exe 5424 svoutse.exe 5304 svoutse.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine 90f3211e4a.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine svoutse.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000023414-44.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1656 d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe 2676 svoutse.exe 448 90f3211e4a.exe 5424 svoutse.exe 5304 svoutse.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svoutse.job d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90f3211e4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db97448fe5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svoutse.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1656 d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe 1656 d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe 2676 svoutse.exe 2676 svoutse.exe 448 90f3211e4a.exe 448 90f3211e4a.exe 1704 msedge.exe 1704 msedge.exe 1888 msedge.exe 1888 msedge.exe 4064 identity_helper.exe 4064 identity_helper.exe 5424 svoutse.exe 5424 svoutse.exe 5304 svoutse.exe 5304 svoutse.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3432 db97448fe5.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 29 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1656 d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 1888 msedge.exe 1888 msedge.exe 3432 db97448fe5.exe 1888 msedge.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe 3432 db97448fe5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2676 1656 d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe 87 PID 1656 wrote to memory of 2676 1656 d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe 87 PID 1656 wrote to memory of 2676 1656 d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe 87 PID 2676 wrote to memory of 448 2676 svoutse.exe 88 PID 2676 wrote to memory of 448 2676 svoutse.exe 88 PID 2676 wrote to memory of 448 2676 svoutse.exe 88 PID 2676 wrote to memory of 3432 2676 svoutse.exe 93 PID 2676 wrote to memory of 3432 2676 svoutse.exe 93 PID 2676 wrote to memory of 3432 2676 svoutse.exe 93 PID 3432 wrote to memory of 1888 3432 db97448fe5.exe 94 PID 3432 wrote to memory of 1888 3432 db97448fe5.exe 94 PID 1888 wrote to memory of 4528 1888 msedge.exe 95 PID 1888 wrote to memory of 4528 1888 msedge.exe 95 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 3492 1888 msedge.exe 96 PID 1888 wrote to memory of 1704 1888 msedge.exe 97 PID 1888 wrote to memory of 1704 1888 msedge.exe 97 PID 1888 wrote to memory of 4620 1888 msedge.exe 98 PID 1888 wrote to memory of 4620 1888 msedge.exe 98 PID 1888 wrote to memory of 4620 1888 msedge.exe 98 PID 1888 wrote to memory of 4620 1888 msedge.exe 98 PID 1888 wrote to memory of 4620 1888 msedge.exe 98 PID 1888 wrote to memory of 4620 1888 msedge.exe 98 PID 1888 wrote to memory of 4620 1888 msedge.exe 98 PID 1888 wrote to memory of 4620 1888 msedge.exe 98 PID 1888 wrote to memory of 4620 1888 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe"C:\Users\Admin\AppData\Local\Temp\d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\1000013001\90f3211e4a.exe"C:\Users\Admin\AppData\Local\Temp\1000013001\90f3211e4a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\1000015001\db97448fe5.exe"C:\Users\Admin\AppData\Local\Temp\1000015001\db97448fe5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8f4546f8,0x7ffa8f454708,0x7ffa8f4547185⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:25⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:85⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:15⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:15⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:15⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:15⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:15⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:15⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:15⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:15⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:15⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:15⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:15⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:15⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:15⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:15⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:15⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:15⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:15⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:15⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:15⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:15⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6656 /prefetch:15⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6848 /prefetch:15⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:15⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7608 /prefetch:15⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:15⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:15⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7988 /prefetch:15⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7352 /prefetch:15⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7616 /prefetch:15⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:85⤵PID:5760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8059668269495513380,5783193729985703667,131072 --disable-features=TranslateUI --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7996 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5424
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD534f7f552e4d79f3cc1f0a4b76f217f36
SHA149c240e30760e76c807c979ed5d03a8a2a468871
SHA256508ed34ea41c68319781354b83fc9079a5639afadc649c2a1eeab1fde95663fd
SHA512930776b974747b5a38a6398f3764705d4b12c1596474293ba8d814d67d9f4dc524a4ea416b091ebaf0dc1a254d91caca9fdda9adab028939da008db31fe9b52a
-
Filesize
152B
MD5781d87fec2756c9226ece4bf19c6c642
SHA1e117ac892db39c61b7f48443e2fd2772d992f788
SHA256e8bdcee8bd197c646942eb8361798528bd9698c7934035745cf76fc84800fee6
SHA5128d0c810f6ac440caf3542770841bcd716075513d6d2255572d5ff2a8594dc415a7ef25fabae6abde5aea2e22aea5a68bb3190ed3a208dbf2ab9c6c586a3943e2
-
Filesize
152B
MD5aea09148e6bd4d1ada651db0f08a763a
SHA1ca45fbe1344f3f5c33b706e4c96d9685f14ae92b
SHA256a82edd678a076c7b72635b16f5f9cb81a0c17dbcda29be216f10dfbea59e9aaa
SHA5126313f24ab59ee0450ff33b982baa93578329af5e0e033a189510df617f5fe6572dabe21ebe1882c3e4d1c37d47b8fd3597b6e236ae07f2517d320e01e640280f
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\5018c79a-a805-488c-8bf1-a6b1a3a84f6d.tmp
Filesize4KB
MD50794ac00b86d4eb541441b61993a5c26
SHA1ce5849d2e681356a319f6a5873ebff9ffe5ba789
SHA2564c7808251715877f61e7f20a25d5d73dd7dc41cc5ae8c287050061f445d95d72
SHA5121c69cc2488f55f2654f674e04e22422930b2b2765f58557d9c2fcaee6d6b5c7ae801396d0041e35fdf0a790de8f51827d7e8852b3311ba936c9c2765eb0a6cdf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5a2bbe49f2fb6a658ed7dd0c7fe4fc7bf
SHA1827095998ee199c6cbac44037f4f99a858a68658
SHA2564d0f0259b0c1a1a71d7ad1b4173576728338f5ec103afea999c89b4bcd118372
SHA512c5a519ff297c2268fd959f4db71ca8054532274e48b63dccd82dc7a4c9c1ce79764ee9429ba1673a3fa82d3ca881d9447ceeb2a01e6518cdcb8b9a73239adaaf
-
Filesize
4KB
MD51dcb02b7de7eb464e7895fe5e4e4676d
SHA1bfc445942b332bd6c59c2f00c25edefd1fcee5fb
SHA2565f8cb1920876d0665b5d740bb8a6050615b49c51a0e376d6ae113d43ea13cae7
SHA512f69a479868b7dcc8fd49bf8b60ecad04106f3f2ff968b27b1373e51a037c2727379d4108832a698ae9c741cbc4408d31471f7e5266eb1b0f17fa49759fc77610
-
Filesize
4KB
MD5e1b72a228b3bc7ff426c20335103d046
SHA1c665b9e57b9b8494f2b3d5794afeb1618cc8edcb
SHA256e5da0ea4e495981c31c57a8dd76ff4b212f9ea7f99a6d96204a6688fa0e48870
SHA512ff79ae17b7f37086104e245b0476bf41dfa61fc2f86bde932c114ffad91dd063fd9f9a43655490075c1f4feb16b2b90ad6f81eed7c07aa4172d0e2ec03008b3d
-
Filesize
24KB
MD50b17501596544d2dfd8944b4594bbcda
SHA19e820131bfc51b730019d9e0af53b5a96c64d791
SHA256c80087cf9cbe84889b09fe385e4466cba0cd44904965cdae88cb9c7488ca5498
SHA512f3df2a748a19b2bc6744e08190909615ea73ca013e44b0f2dab520b2a55af42d0a29e153fd7a0e3947927eb633763850ebc0c3749dcdb54bb59fb41f5bb867a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe57fdf7.TMP
Filesize24KB
MD5ad1f8f38ec75901d33c5dd0d0c5100dd
SHA1826205180855cf8e3ccaee675db6cc0a2defc1c0
SHA256a537c31fcf331abb6271607eb1f3d7bc462db62351af63640298dc752de14123
SHA512d31e0286574a1faf7b31e7472a3f5b0d1840bcbcb42b4560d05c2e34ddb06d24f7d5d82feaf44c28754582480eb094e1ef523eac1247fe4c112d71832c38d1bb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1
Filesize264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\e5f53201-2ef2-4941-82cf-a5c4f5d5ac83.tmp
Filesize9KB
MD57c3b28e1b311f1c8d65f42f2dec05dee
SHA172de0465d4d266ff7be7a0d20b740119fdfbf1c9
SHA256eafda737e7b4e81026b7590db42ec8618d30ee3c5424ece792a4c81ce6c23fe9
SHA512af0537a91b45159354a0fd6e36128aacbad0ad5341fddb0e20ea65f7c0d4865483d600bdffb6e9d796ff9cf1f0bdfc1f9793a4a9d376de6bb27c5776ae4ad07b
-
Filesize
1.8MB
MD598e3a98d783ce899483ed33986c6c771
SHA1cc30a8078b4cf4e9bc3326104951c19736814811
SHA256d9b38a5fe729b93939273a2d04a2ec4dd968cceb4fdcb45aa739608c3a3b14a2
SHA5120ef8ddec52f2e17927e43979bee82cbb00366941b1aca4b31a2913b4d054ac4858538e04fa2f4fc889fc6747f26da22657d0cdaa0f2528fa538963e0e2b6daf1
-
Filesize
1.7MB
MD5952471642155df63bf9dd4bbd2828c45
SHA17de09af139988b2712b7922220a68940ca6379b5
SHA2562141d9159c4fca891bba493acba71c5973b9d554e4b0552f4a87be7f3bcd112e
SHA51204debdb0c9a6761e0132e78536073c250b4d4b2d1be1e1761c6d2e388713b84dfaa80adc984de548bb42ce2156500d650081c4084b28f03b316ac7a18d996a5a
-
Filesize
896KB
MD5300bfec6e18ed712d6127c83e577657a
SHA1844e28c788a2d9c232e330ad29558bfda47f5eb2
SHA256115d42fde8c0fde6ade95a36fa29db55a2ba9fb1dcd105501fc39d0b6c1bf1fd
SHA5121f2606f3fb0cbebe0718d6175f83476c4732179802bf44f916852ed65f8b83cbef2b6e84d4eb014655761e6eb90dba0e1f99ed1d57e238fe5339b5077ee3f247
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Z50BHUD76NY8L87JAXJQ.temp
Filesize3KB
MD55c35e879d0e4595b40cff7be3c100543
SHA120ce5e012881ddae35264a73bf619f40e77e693b
SHA256ee65f36f91c73496ef7ac542245084c8302881833c37da006bebfdb861763ec3
SHA512228274bb47e5dc57498f9d8962c09fd0ff0c9d6011542f78eb37229b0039ced864ec479a0afd281c098117900799c2a41f2ac626c7076c9979ad8b29bd15fcc2