Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 13:41

General

  • Target

    file.exe

  • Size

    1.9MB

  • MD5

    baf9c65740a624a1368c5daf804dbe75

  • SHA1

    4d420290abe5a7cb44aa3ee6471e2f914d7f092a

  • SHA256

    f03a849ae2d670ff7e468da63c26789b8c738d830a0e49aad3a26ff5bc555805

  • SHA512

    5624e7a58773275af48696b0a382863402b61019a22f779d579b50f649aba21f4cd74d21bc6f58c57b10f0ecab03627897046b08282003a3516efc9f46612573

  • SSDEEP

    49152:85k1rXyxjjLjmnH6n8wVSg2oHJ0HU5gJA:8ygxjnana8wzBHJ0NJ

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Extracted

Family

stealc

Botnet

leva

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 31 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Users\Admin\AppData\Roaming\1000051000\2a681b8205.exe
        "C:\Users\Admin\AppData\Roaming\1000051000\2a681b8205.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2892
      • C:\Users\Admin\AppData\Roaming\1000052000\dec68f9d73.exe
        "C:\Users\Admin\AppData\Roaming\1000052000\dec68f9d73.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1472
      • C:\Users\Admin\AppData\Local\Temp\1000053001\d7461cc221.exe
        "C:\Users\Admin\AppData\Local\Temp\1000053001\d7461cc221.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
          4⤵
          • Enumerates system info in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff998e246f8,0x7ff998e24708,0x7ff998e24718
            5⤵
              PID:3948
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:2
              5⤵
                PID:4732
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3724
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:8
                5⤵
                  PID:1972
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1
                  5⤵
                    PID:828
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:1
                    5⤵
                      PID:4132
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:1
                      5⤵
                        PID:4812
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:1
                        5⤵
                          PID:4284
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:1
                          5⤵
                            PID:212
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4324 /prefetch:1
                            5⤵
                              PID:3972
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:1
                              5⤵
                                PID:3152
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:1
                                5⤵
                                  PID:1868
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:1
                                  5⤵
                                    PID:4296
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:1
                                    5⤵
                                      PID:516
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1
                                      5⤵
                                        PID:2256
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                                        5⤵
                                          PID:2368
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:1
                                          5⤵
                                            PID:2976
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:1
                                            5⤵
                                              PID:5044
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:1
                                              5⤵
                                                PID:1112
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:1
                                                5⤵
                                                  PID:1848
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:1
                                                  5⤵
                                                    PID:5352
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:1
                                                    5⤵
                                                      PID:5360
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1
                                                      5⤵
                                                        PID:5368
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:1
                                                        5⤵
                                                          PID:5376
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:1
                                                          5⤵
                                                            PID:5488
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6984 /prefetch:1
                                                            5⤵
                                                              PID:5640
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7116 /prefetch:1
                                                              5⤵
                                                                PID:5648
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7236 /prefetch:1
                                                                5⤵
                                                                  PID:5656
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6912 /prefetch:1
                                                                  5⤵
                                                                    PID:5664
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6984 /prefetch:1
                                                                    5⤵
                                                                      PID:5948
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7088 /prefetch:1
                                                                      5⤵
                                                                        PID:5856
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:1
                                                                        5⤵
                                                                          PID:5864
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7532 /prefetch:1
                                                                          5⤵
                                                                            PID:5872
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7016 /prefetch:1
                                                                            5⤵
                                                                              PID:1092
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7980 /prefetch:1
                                                                              5⤵
                                                                                PID:5356
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7720 /prefetch:8
                                                                                5⤵
                                                                                  PID:3996
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7720 /prefetch:8
                                                                                  5⤵
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:5320
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8832271209873039496,15367150187354287494,131072 --disable-features=TranslateUI --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3200 /prefetch:2
                                                                                  5⤵
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:4704
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:4128
                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                            1⤵
                                                                              PID:1036
                                                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                                              1⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Identifies Wine through registry keys
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:5864
                                                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                                              1⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Identifies Wine through registry keys
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:6012

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              34aba16c742e553873903e1754413622

                                                                              SHA1

                                                                              27362a8e18fb86b14d7b048a7cdf18eec3eecbbe

                                                                              SHA256

                                                                              5b9c19c7f70da7d2c3c707ff24966ea41ab596dad2d3b3e142e82820ae6b40c1

                                                                              SHA512

                                                                              79581a62e335dc495e20eb2d4e9914e50b896b170a664559a30649c1c999de0c71716cb5f6b7f00779207afe0b3aff11ecf775efacd40f419ae23ee22246a222

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              c6251717d90b3b9e0a599c2607587d13

                                                                              SHA1

                                                                              c4b17de168cc8c0555ab848eb6b849a3f866a914

                                                                              SHA256

                                                                              bc44387734cfb937a295878f780fcc275a64ea28ba6854ad700e7110aded22ac

                                                                              SHA512

                                                                              fc348408cdecc0b0148d7b3e98ad310ca9c5373c06218c126ed41cbcf9bd491e4389786a1bc6da890fdc49b233f9b32c40396bc354aad15c243ccd773577f475

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              6ee804d3bb76ce235d742a83343c3a38

                                                                              SHA1

                                                                              03bd07739b20e2c832e309dc7892f191b0661683

                                                                              SHA256

                                                                              6ef4c29ada3aebd98e9a44e10a1693a7e477ac21589090a2544c768555ee988e

                                                                              SHA512

                                                                              effca350fa8a0c90cf7d7cebdb1b3d1795c8d6a98a592987f8d6d6560f590df5ae9b19d08841170e9953e9ed10eaf3c37590c3559cfe138957d8a254b516d775

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\throttle_store.dat

                                                                              Filesize

                                                                              20B

                                                                              MD5

                                                                              9e4e94633b73f4a7680240a0ffd6cd2c

                                                                              SHA1

                                                                              e68e02453ce22736169a56fdb59043d33668368f

                                                                              SHA256

                                                                              41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                                                              SHA512

                                                                              193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\85e56727-4055-4edb-b7fd-079d71a73f04.tmp

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              476b9d3b4a01c29bafedf3aad6ca8091

                                                                              SHA1

                                                                              4733da66446ea8e85ed590f5069cc9ddafe3f5fd

                                                                              SHA256

                                                                              1b40cd0c0a0b354890e6723d957d50fa3d684d145e76777dd7d99bfd0b5ce3a6

                                                                              SHA512

                                                                              42d5977785d1bcc8975bb1b91704af5794a3ac5e2a61445830ac8918ef60d3d4bc1fb4095454a1550da2be62754b8176331749b9ba7882ee09ea0e0ad0c88aaa

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb\MANIFEST-000001

                                                                              Filesize

                                                                              41B

                                                                              MD5

                                                                              5af87dfd673ba2115e2fcf5cfdb727ab

                                                                              SHA1

                                                                              d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                              SHA256

                                                                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                              SHA512

                                                                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Microsoft Edge.lnk

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              e3ab29ff9632828bea79bf617ce69312

                                                                              SHA1

                                                                              c53ad9447968320bef8df513bc9aa2c5ba817ad7

                                                                              SHA256

                                                                              8c349839666717a0b857eba46ab58598e14807778be310b239fbc7f51358072b

                                                                              SHA512

                                                                              93aa976c77561b3c2b319a1f933f235d05875b9c7fdd9a6caeae8348a2ed7a940e7b7436afb7b33c49a2f30c80b2eb93daa82013ce1ff247fdb2bbabe499fa23

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              aa9c3cc00f1c08f9f4929e46356d357c

                                                                              SHA1

                                                                              c68fd6390aeae8ae2ba5d01a5d84a9ebaa3621d8

                                                                              SHA256

                                                                              ff28ce465d7e073e116907d4719af474f969b61a3af3fb368a1c7468e25eff72

                                                                              SHA512

                                                                              38fd1a25a0bffcefe9ac4f8e3e013e87edb08dfa2c3d8b920e707b32e661614d18662cbefe952a89cad2f74d3e651a3da8c4a2b465532469655ad7aa99fb6490

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              ee74f7c8686354dacb8ca6e6008e5a8e

                                                                              SHA1

                                                                              83a9c78a088a562a04e5923621998d43255855c3

                                                                              SHA256

                                                                              340ff9adb2dac4e54dbfc26cdf90e6906e263be5a7c853c0b90af5ebad3db539

                                                                              SHA512

                                                                              492c91a65b5eb858957a332891c377577acee4917d2bf43d4f2f9ffbd69a129a8c5f8672e17629a2145e864499e9b3f5615be28004c022f28805f60a49ab6b04

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences

                                                                              Filesize

                                                                              24KB

                                                                              MD5

                                                                              d5656bab68cdffe0552e09002de71bb8

                                                                              SHA1

                                                                              7e0b4494fcb982efaec44abc8ab6edc6cabf53c7

                                                                              SHA256

                                                                              dcf95864fe70a474f25efe5b2c6d178a04b4ce5c43dfe207bd6f00fa6be92657

                                                                              SHA512

                                                                              f6df99d3c1418e7f65d09a56e073947bdb26b5ec9b669e76d6a43adde731f8b87fcf7619b69b1c0657b27310c9ee495414033f26d4395bb6f608df76a5fd9e50

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe57d7f1.TMP

                                                                              Filesize

                                                                              24KB

                                                                              MD5

                                                                              0f3a69a40789de7fb9929d4bf7bddc1d

                                                                              SHA1

                                                                              11099c462a7bfff1cf35c73ca3def1df7e3c84c5

                                                                              SHA256

                                                                              6fb9b1619283fa5893f81785aab3d4344943e6444002c55630ca23358acaee22

                                                                              SHA512

                                                                              7900ff743537c4fac709dc2ee63963112091e5709b00c487ee8f7e147b6aadaf17c38c4cbce392d1e0215509b32617ee730d1f99ec901f33b32b7f1894a0db36

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              46295cac801e5d4857d09837238a6394

                                                                              SHA1

                                                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                              SHA256

                                                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                              SHA512

                                                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              cf89d16bb9107c631daabf0c0ee58efb

                                                                              SHA1

                                                                              3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                              SHA256

                                                                              d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                              SHA512

                                                                              8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1

                                                                              Filesize

                                                                              264KB

                                                                              MD5

                                                                              f50f89a0a91564d0b8a211f8921aa7de

                                                                              SHA1

                                                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                              SHA256

                                                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                              SHA512

                                                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              0962291d6d367570bee5454721c17e11

                                                                              SHA1

                                                                              59d10a893ef321a706a9255176761366115bedcb

                                                                              SHA256

                                                                              ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                              SHA512

                                                                              f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              41876349cb12d6db992f1309f22df3f0

                                                                              SHA1

                                                                              5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                              SHA256

                                                                              e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                              SHA512

                                                                              e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              206702161f94c5cd39fadd03f4014d98

                                                                              SHA1

                                                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                              SHA256

                                                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                              SHA512

                                                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\c706294b-cc9e-4dc8-a3c3-ce3a916bc9e6.tmp

                                                                              Filesize

                                                                              9KB

                                                                              MD5

                                                                              ee04e974c683894a185f16b45738609c

                                                                              SHA1

                                                                              b9684c05f19899ec16dcd3c1a0cc4f66aeda6953

                                                                              SHA256

                                                                              b464c20175ba987096120b849e680d6e050b74188cd0fab65d2108ba34bfc486

                                                                              SHA512

                                                                              dd03c984286478b4b37eac223d6bac8d00d7111508e8675fdafdccd049b2d55fbafe38ae8b797b92a2385fad3223d02e1e656ded0121f2419d3a079b260a3f30

                                                                            • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                                                                              Filesize

                                                                              1.9MB

                                                                              MD5

                                                                              baf9c65740a624a1368c5daf804dbe75

                                                                              SHA1

                                                                              4d420290abe5a7cb44aa3ee6471e2f914d7f092a

                                                                              SHA256

                                                                              f03a849ae2d670ff7e468da63c26789b8c738d830a0e49aad3a26ff5bc555805

                                                                              SHA512

                                                                              5624e7a58773275af48696b0a382863402b61019a22f779d579b50f649aba21f4cd74d21bc6f58c57b10f0ecab03627897046b08282003a3516efc9f46612573

                                                                            • C:\Users\Admin\AppData\Local\Temp\1000053001\d7461cc221.exe

                                                                              Filesize

                                                                              896KB

                                                                              MD5

                                                                              815d0325b08029dc535dc4c7c9daeaf7

                                                                              SHA1

                                                                              5f0d5f6624954c274bbce5edd211b28696897400

                                                                              SHA256

                                                                              80c206cdeb203530a85f6700016155be6e1380d913c589bad66ca7a7ff209b4f

                                                                              SHA512

                                                                              cb754b8f9d907be570ed3a5d218184970872c015b88e8ba78ae5425198fcf8ea6e8d01a4ecfbd8b3dbc1ac3eccfcc692297579cb5c9b67a560059038f62c8d0f

                                                                            • C:\Users\Admin\AppData\Roaming\1000051000\2a681b8205.exe

                                                                              Filesize

                                                                              1.7MB

                                                                              MD5

                                                                              c318d3326ce1921ff20be775cbc99782

                                                                              SHA1

                                                                              94bb85d34e0fccf26fd58cfadfabe90606ec00f4

                                                                              SHA256

                                                                              3ab3541c8960a2f4ccc60e0e8efc339d0f99d9cb96b0ea46a5e0440b020347d9

                                                                              SHA512

                                                                              35556fabf9cd5c229fb2975a9075dd25b1ff913d152689a5e955b6214691779b6e8f58d53750bd9abb1ffddedc5b238a6284628c1b3a2286f59ef727aade7919

                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FONJQPHHRK1X9RK9RGN8.temp

                                                                              Filesize

                                                                              3KB

                                                                              MD5

                                                                              137749bdbab7929103ff5a7756ab49c7

                                                                              SHA1

                                                                              fa195b20f60474d988110ff8965f108fd38996f7

                                                                              SHA256

                                                                              7e81deec5038fa143c458f01d654589fb4f150b5969e4d1b5d895488b4dda3e0

                                                                              SHA512

                                                                              b1673d24e9d12df70406e72c91ee53a22935684b07e36e8c2614f78da46eace02fdf934ef4b0927af8a4d635f876bc7394aaf7c41e22caa990f1c32b84c256af

                                                                            • memory/1472-59-0x0000000000150000-0x00000000007C6000-memory.dmp

                                                                              Filesize

                                                                              6.5MB

                                                                            • memory/1472-56-0x0000000000150000-0x00000000007C6000-memory.dmp

                                                                              Filesize

                                                                              6.5MB

                                                                            • memory/2892-39-0x00000000008D0000-0x0000000000F46000-memory.dmp

                                                                              Filesize

                                                                              6.5MB

                                                                            • memory/2892-58-0x00000000008D0000-0x0000000000F46000-memory.dmp

                                                                              Filesize

                                                                              6.5MB

                                                                            • memory/2892-40-0x00000000008D0000-0x0000000000F46000-memory.dmp

                                                                              Filesize

                                                                              6.5MB

                                                                            • memory/2892-38-0x00000000008D0000-0x0000000000F46000-memory.dmp

                                                                              Filesize

                                                                              6.5MB

                                                                            • memory/4000-18-0x0000000000DB0000-0x0000000001284000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4000-1-0x00000000773F4000-0x00000000773F6000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/4000-0-0x0000000000DB0000-0x0000000001284000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4000-2-0x0000000000DB1000-0x0000000000DDF000-memory.dmp

                                                                              Filesize

                                                                              184KB

                                                                            • memory/4000-3-0x0000000000DB0000-0x0000000001284000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4000-4-0x0000000000DB0000-0x0000000001284000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-271-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-372-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-19-0x0000000000EA1000-0x0000000000ECF000-memory.dmp

                                                                              Filesize

                                                                              184KB

                                                                            • memory/4432-296-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-16-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-21-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-85-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-258-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-349-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-22-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-368-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-423-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-420-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-20-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-382-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-392-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-179-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-411-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-412-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-413-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-417-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/4432-416-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/5864-371-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/5864-370-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB

                                                                            • memory/6012-415-0x0000000000EA0000-0x0000000001374000-memory.dmp

                                                                              Filesize

                                                                              4.8MB