Malware Analysis Report

2024-10-23 21:52

Sample ID 240909-nxyhaawdmk
Target bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd
SHA256 bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd
Tags
amadey stealc c7817d rave discovery evasion persistence stealer trojan credential_access spyware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd

Threat Level: Known bad

The file bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd was found to be: Known bad.

Malicious Activity Summary

amadey stealc c7817d rave discovery evasion persistence stealer trojan credential_access spyware

Amadey

Stealc

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Credentials from Password Stores: Credentials from Web Browsers

Downloads MZ/PE file

Checks computer location settings

Unsecured Credentials: Credentials In Files

Reads data files stored by FTP clients

Checks BIOS information in registry

Loads dropped DLL

Executes dropped EXE

Identifies Wine through registry keys

Reads user/profile data of web browsers

Checks installed software on the system

Adds Run key to start application

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of NtSetInformationThreadHideFromDebugger

AutoIT Executable

Drops file in Windows directory

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Modifies registry class

Checks processor information in registry

Enumerates system info in registry

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-09 11:47

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-09 11:47

Reported

2024-09-09 11:49

Platform

win10v2004-20240802-en

Max time kernel

149s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe"

Signatures

Amadey

trojan amadey

Stealc

stealer stealc

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Wine C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0411144cca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000030001\\0411144cca.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\svoutse.job C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 840 wrote to memory of 396 N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 840 wrote to memory of 396 N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 840 wrote to memory of 396 N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 396 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe
PID 396 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe
PID 396 wrote to memory of 4856 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe
PID 396 wrote to memory of 372 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe
PID 396 wrote to memory of 372 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe
PID 396 wrote to memory of 372 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe
PID 396 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe
PID 396 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe
PID 396 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe
PID 4628 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4628 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 1012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 1012 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 3276 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 2156 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 2156 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1876 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe

"C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe"

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"

C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe

"C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe"

C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe

"C:\Users\Admin\AppData\Local\Temp\1000030001\0411144cca.exe"

C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe

"C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d0b046f8,0x7ff8d0b04708,0x7ff8d0b04718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4360 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4480 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6720 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7640 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6748 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7652 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7652 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10540077680998733328,7648125895435251677,131072 --disable-features=TranslateUI --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7460 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
RU 31.41.244.10:80 31.41.244.10 tcp
RU 31.41.244.11:80 31.41.244.11 tcp
US 8.8.8.8:53 10.244.41.31.in-addr.arpa udp
US 8.8.8.8:53 5.181.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 11.244.41.31.in-addr.arpa udp
RU 185.215.113.103:80 185.215.113.103 tcp
US 8.8.8.8:53 103.113.215.185.in-addr.arpa udp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.102.84:443 accounts.google.com tcp
US 8.8.8.8:53 84.102.250.142.in-addr.arpa udp
RU 185.215.113.103:80 185.215.113.103 tcp
NL 142.250.102.84:443 accounts.google.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 3.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
GB 216.58.212.238:443 play.google.com tcp
GB 216.58.212.238:443 play.google.com tcp
US 8.8.8.8:53 www.google.com udp
GB 142.250.178.4:443 www.google.com tcp
GB 216.58.212.238:443 play.google.com udp
US 8.8.8.8:53 238.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 4.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
NL 142.250.102.84:443 accounts.google.com udp

Files

memory/840-0-0x0000000000E60000-0x000000000130B000-memory.dmp

memory/840-1-0x0000000077BE4000-0x0000000077BE6000-memory.dmp

memory/840-2-0x0000000000E61000-0x0000000000E8F000-memory.dmp

memory/840-3-0x0000000000E60000-0x000000000130B000-memory.dmp

memory/840-4-0x0000000000E60000-0x000000000130B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

MD5 a95f656967876bb1e09fc882e5e2fd57
SHA1 80539c31b4c982bfd8bb0f932130a3cfc96b89d7
SHA256 bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd
SHA512 0d5a50a9ec1e445184c75b7381130cdd70c015da96543edc5a69d4568dadd278ca44845f7fae2755ce35a2cb3245751a2b4dd6b87a640b9d15f0510dcf6dbc08

memory/396-17-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/840-16-0x0000000000E60000-0x000000000130B000-memory.dmp

memory/396-24-0x00000000050A0000-0x00000000050A1000-memory.dmp

memory/396-25-0x0000000000721000-0x000000000074F000-memory.dmp

memory/396-23-0x00000000050B0000-0x00000000050B1000-memory.dmp

memory/396-22-0x0000000005090000-0x0000000005091000-memory.dmp

memory/396-21-0x00000000050F0000-0x00000000050F1000-memory.dmp

memory/396-20-0x00000000050C0000-0x00000000050C1000-memory.dmp

memory/396-19-0x00000000050D0000-0x00000000050D1000-memory.dmp

memory/396-26-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-27-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-28-0x0000000000720000-0x0000000000BCB000-memory.dmp

C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe

MD5 c06c4e6ed6f4c67541e9cdacb508f653
SHA1 0a587b8151e8634a48dd686157b45a2e0477093c
SHA256 75406b44f46f30aed814150ed323b10f34d6e68b585a75b6e9796f556f1cd691
SHA512 93f7d6ee59b28bf72d1bfe16c5482d9fa0e1eb0f8ce9b901dc31a66b07e2e65cf21972723c90d5f86826d2cad53d126f18f1ae085416cc203059fa3c13d71440

memory/4856-44-0x0000000000D50000-0x00000000013D8000-memory.dmp

memory/4856-45-0x0000000000D51000-0x0000000000D65000-memory.dmp

memory/4856-46-0x0000000000D50000-0x00000000013D8000-memory.dmp

memory/396-47-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/372-63-0x0000000000490000-0x0000000000B18000-memory.dmp

memory/4856-64-0x0000000000D50000-0x00000000013D8000-memory.dmp

memory/396-65-0x0000000000720000-0x0000000000BCB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000033001\b65e535902.exe

MD5 dc549e79ccffdfe60455ce30d525e3dd
SHA1 e7b184b95cede040275e379132ac4cf7a7969840
SHA256 c40a4c1ac2b63630b79c3201dc82aebe63282bc636a5060371a366365b8f7594
SHA512 a4e4f3fa3998b0170fa70cc486b0bbc90c58c382ddc8c590caa72de5d71a3db0f3cf2b215af76445fc7bc987aa9a4b09f5dfe4326bd91c64c82728210e01a84b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\throttle_store.dat

MD5 9e4e94633b73f4a7680240a0ffd6cd2c
SHA1 e68e02453ce22736169a56fdb59043d33668368f
SHA256 41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512 193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 b1bba7c201d9d467094154d7fea4c0eb
SHA1 5de8c17021c3ae2cc9b770c3cd6a9f84f359f064
SHA256 143b36b5abbc770804ac48883d4d284652702084ec8804da86e7270a3b21641f
SHA512 0552ef32b53aafa262616375ead8d88c74c5255a1aac49e63316170abffce92a3ce00bf4b2da61054458c9de5430cf5c7fbd36f1abcd0f9a453c67faf0f530e4

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 8e0973b1873084faa3d45f021dfa00f1
SHA1 beb0933377fc41a9b9c1d919522cebb29dd968a3
SHA256 a71c1ac9c82d3ddbca31c96cd7b8ed82df9c0828d2a09f940cbc0be494e44039
SHA512 c24994598c63d36082e96d94c54b6bfe13c48dfbd83e81b3017da9194ca2489ae3a098f751f84ca7d39ff14f82986caa4ef8a4cffd777cd00409e5e74c6f127d

\??\pipe\LOCAL\crashpad_1876_HEHSSKEIVYDRSLFX

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 890b259d7581977ae95e4c43b1d4a452
SHA1 7c047b5426d4d482c20b295b89fbfb7842c45dd0
SHA256 a0caca4de6d70941dc6a95e75f709d5e84fef86194756f0834a064e68c590570
SHA512 506c86c562eb6996495ff2c888ffa1c3213272339252e1b12ca9fc066c60e0be7da527daf2892bd1d822b101760a1539d6ec2529e10028f3be9eeefeb60cc182

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\temp-index

MD5 1df248f7ab145b0d9f54f01c5e5553e2
SHA1 3ce71739f7b9e3e0cff1f2a5fa8dcb67a54016d0
SHA256 9707d3fdb1dc8cad3ac1c4b5fb309b9a91912c4cd8958773e90b4e539bc3bd11
SHA512 9ec90914c179c04508b4915de4baa45600b159c044f8a8814ca0b0864b61250bb80c807eaa988ba1862fb813d36ff8e1ac8be34ff27ac5e43c47d9c1090b08d4

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\2177ea35-eb12-4504-b2c5-eddc07f2b45a.tmp

MD5 47d87c7cfbe9465c985152854e620453
SHA1 075d91966c494cec1b655eaefc78adb1432be6e3
SHA256 f93b9b7063c3c12da06e3914792cd6d0c03b805be9574c8c459c4900ba04928d
SHA512 6bd17e2dd2408dde885422ad25b8187172a7d07efd2ad2a05a4e9d7f58836a926f7e3578b42d29aa93997e586a489df9f3870f56d962bf0a3632db501849faa3

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Microsoft Edge.lnk

MD5 0c0062b959499b547a4ef8acde9f36b4
SHA1 61e0c0e214b59292295a137b59bc13ff8bd02df6
SHA256 9a6f468eb8d409d9ac4c90bd9be327a3757761f54492ae146a16e4e663b40554
SHA512 9da0f4aef97e698ce377de5ac59b6fc7f8fb0804832a96d80fb5eeac00a07971d6280f16e08c0e1e8cc4a0d06919df96927ec262e67f8076a3dbaf34acaec781

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3L6BENH3XE3TKQFAJ2DK.temp

MD5 e6d6be7e0606c53b6d260bdd809641c3
SHA1 4de64f71788a9e852c44eb5f5a8122ead3663e07
SHA256 c9a82042c96848e48032a971d588858a28db27396042545659a8aaf5c31a0434
SHA512 e2c199a2fbf8aeea609956a7e53f68431c2ad1f089973a6086c78e54bfd16e12ee25ee335c067f1053f7a44845ddceb9020f7ec3572e226b806ac871a47113ec

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

memory/372-274-0x0000000000490000-0x0000000000B18000-memory.dmp

memory/396-275-0x0000000000720000-0x0000000000BCB000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 9dc78eae49700328e2f5613c0ec8e003
SHA1 fd60cd4d0edcbb88febef1997ccb0769eb7bb348
SHA256 7468d24947980fc27ec4709721bbd0ac5312252f587d9adc054cb0fd20ca1dba
SHA512 19bbf71347bdce662b90a81c9d3fc3c7edc4c9290113db42bc6da96d49fd6a2bb65d3d8b6e919b500e68f71928b1bdd28685fe66768f41167fbcdd07ba21e8f9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences

MD5 ee9a16fd7a669c7e1f5bdf5b080052ba
SHA1 14513d809185ce5d5f2984d9284125d854ab3841
SHA256 20e69e635393ae4a7c0a285077a9799172eaf524f696076aaa6678a3dcff5500
SHA512 3e3a901c625900ba1ecef086c311f065a0680b295206d08d1461ca5e2f51556a9e06e39d39f6ba72413228872095eb9f340f7ae9a0bb03c8a1f6f1c22bea70f9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe57cdc0.TMP

MD5 6431f9e35187999a7bbae3816c50232d
SHA1 f2d464cc40cb18f890cde346ec75535c1d120139
SHA256 d535e11fd04bdbe2203ccf79a9365eeb92abbc78a85e53e06aca965759cc0993
SHA512 3daa620a7bf67be0c27801db1497926e273aeb6d615935f30bc9ea7abbfae561136224bc31f00f010247ed1667f4343a0f7acd6889c361c654082cb43b5aac88

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

memory/396-352-0x0000000000720000-0x0000000000BCB000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\289239b5-3452-4f70-8c03-a301c702a906.tmp

MD5 bf77548624ec042e3b7a02d0461c7c11
SHA1 3769191c3e9aeb6bad68ecc3e4873ae9d857774f
SHA256 efd582fe14d807ca345352b21d74deb276b1af39b18ab9b24e371252611abb61
SHA512 f9aa673deae0e24fa2fde1a69911000934e7739ed48ca3a985a639d8eceddaf57aa0b57dafded2e947e853e7c1c32fd88de88f3aa80660b807675da22d4477fc

memory/396-371-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/6092-374-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-375-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-376-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-386-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-396-0x0000000000720000-0x0000000000BCB000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 210d3a8e69396664f0154bb8d4143699
SHA1 1cc4c3652fda96b779fdb1f1aec867abfc6d3a1f
SHA256 254ba47542ac0ebede5a58f6a928e09a80501d3285466c1ab9c4a74fd7d61205
SHA512 8fca1644a4d8dff38733ef3d3ff399307f5d03fd3ee249ae86e216dfa1e7bb2d432b07edc579585fc37d401f68554c839387ac012f5292648a052dcaa86c8875

memory/396-415-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-416-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/5028-418-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/5028-419-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-420-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-421-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-422-0x0000000000720000-0x0000000000BCB000-memory.dmp

memory/396-425-0x0000000000720000-0x0000000000BCB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-09-09 11:47

Reported

2024-09-09 11:49

Platform

win11-20240802-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe"

Signatures

Amadey

trojan amadey

Stealc

stealer stealc

Credentials from Password Stores: Credentials from Web Browsers

credential_access stealer

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\ProgramData\FBFCAKKKFB.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\ProgramData\FBFCAKKKFB.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\ProgramData\FBFCAKKKFB.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Wine C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Wine C:\ProgramData\FBFCAKKKFB.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Unsecured Credentials: Credentials In Files

credential_access stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\Software\Microsoft\Windows\CurrentVersion\Run\58e40f3cb0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000030001\\58e40f3cb0.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Checks installed software on the system

discovery

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\svoutse.job C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\ProgramData\FBFCAKKKFB.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe N/A
N/A N/A C:\ProgramData\FBFCAKKKFB.exe N/A
N/A N/A C:\ProgramData\FBFCAKKKFB.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4860 wrote to memory of 4892 N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 4860 wrote to memory of 4892 N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 4860 wrote to memory of 4892 N/A C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 4892 wrote to memory of 4620 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe
PID 4892 wrote to memory of 4620 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe
PID 4892 wrote to memory of 4620 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe
PID 4892 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe
PID 4892 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe
PID 4892 wrote to memory of 2500 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe
PID 4892 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe
PID 4892 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe
PID 4892 wrote to memory of 2988 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe
PID 2988 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2988 wrote to memory of 952 N/A C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 656 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 1688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 3536 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 3536 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 3200 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 3200 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 3200 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 3200 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 3200 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 952 wrote to memory of 3200 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe

"C:\Users\Admin\AppData\Local\Temp\bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd.exe"

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"

C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe

"C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe"

C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe

"C:\Users\Admin\AppData\Local\Temp\1000030001\58e40f3cb0.exe"

C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe

"C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa1c253cb8,0x7ffa1c253cc8,0x7ffa1c253cd8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1820 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4404 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7300 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7584 /prefetch:8

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\FBFCAKKKFB.exe"

C:\ProgramData\FBFCAKKKFB.exe

"C:\ProgramData\FBFCAKKKFB.exe"

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,7436528422218973807,17480031669467836386,131072 --disable-features=TranslateUI --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=876 /prefetch:2

Network

Country Destination Domain Proto
RU 31.41.244.10:80 31.41.244.10 tcp
RU 31.41.244.11:80 31.41.244.11 tcp
US 8.8.8.8:53 10.244.41.31.in-addr.arpa udp
US 8.8.8.8:53 11.244.41.31.in-addr.arpa udp
RU 185.215.113.103:80 185.215.113.103 tcp
NL 142.250.102.84:443 accounts.google.com tcp
NL 142.250.102.84:443 accounts.google.com udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 227.179.250.142.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
GB 216.58.212.238:443 play.google.com tcp
GB 216.58.212.238:443 play.google.com tcp
GB 216.58.212.238:443 play.google.com udp
GB 142.250.178.4:443 www.google.com tcp
RU 31.41.244.11:80 31.41.244.11 tcp
RU 185.215.113.103:80 185.215.113.103 tcp
NL 142.250.102.84:443 accounts.google.com udp
NL 142.250.102.84:443 accounts.google.com udp

Files

memory/4860-0-0x0000000000690000-0x0000000000B3B000-memory.dmp

memory/4860-1-0x0000000077916000-0x0000000077918000-memory.dmp

memory/4860-2-0x0000000000691000-0x00000000006BF000-memory.dmp

memory/4860-3-0x0000000000690000-0x0000000000B3B000-memory.dmp

memory/4860-4-0x0000000000690000-0x0000000000B3B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

MD5 a95f656967876bb1e09fc882e5e2fd57
SHA1 80539c31b4c982bfd8bb0f932130a3cfc96b89d7
SHA256 bbad8a2761f1a01b46d06467cf1b0788d99432eabc0a5f154aca73329c1e22cd
SHA512 0d5a50a9ec1e445184c75b7381130cdd70c015da96543edc5a69d4568dadd278ca44845f7fae2755ce35a2cb3245751a2b4dd6b87a640b9d15f0510dcf6dbc08

memory/4892-16-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4860-18-0x0000000000690000-0x0000000000B3B000-memory.dmp

memory/4892-19-0x00000000007A1000-0x00000000007CF000-memory.dmp

memory/4892-20-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-21-0x00000000007A0000-0x0000000000C4B000-memory.dmp

C:\Users\Admin\AppData\Roaming\1000026000\7c6a013554.exe

MD5 c06c4e6ed6f4c67541e9cdacb508f653
SHA1 0a587b8151e8634a48dd686157b45a2e0477093c
SHA256 75406b44f46f30aed814150ed323b10f34d6e68b585a75b6e9796f556f1cd691
SHA512 93f7d6ee59b28bf72d1bfe16c5482d9fa0e1eb0f8ce9b901dc31a66b07e2e65cf21972723c90d5f86826d2cad53d126f18f1ae085416cc203059fa3c13d71440

memory/4892-37-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4620-38-0x0000000000D70000-0x00000000013F8000-memory.dmp

memory/2500-53-0x0000000000BB0000-0x0000000001238000-memory.dmp

memory/4892-55-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-56-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-57-0x00000000007A0000-0x0000000000C4B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000033001\0411144cca.exe

MD5 dc549e79ccffdfe60455ce30d525e3dd
SHA1 e7b184b95cede040275e379132ac4cf7a7969840
SHA256 c40a4c1ac2b63630b79c3201dc82aebe63282bc636a5060371a366365b8f7594
SHA512 a4e4f3fa3998b0170fa70cc486b0bbc90c58c382ddc8c590caa72de5d71a3db0f3cf2b215af76445fc7bc987aa9a4b09f5dfe4326bd91c64c82728210e01a84b

memory/4620-58-0x0000000061E00000-0x0000000061EF3000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\throttle_store.dat

MD5 9e4e94633b73f4a7680240a0ffd6cd2c
SHA1 e68e02453ce22736169a56fdb59043d33668368f
SHA256 41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512 193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 47e829dff2cf43bce842436f62cd1671
SHA1 1dd3c3dc9b828d3f6362a692507936981689fbd9
SHA256 4aa770f880a8b84fd508c0787a81ba74a2de1311b1dfa12de59c4a66d757d6fc
SHA512 049489b2af212f36987fd26e531322e5589bb2a52b2b58beeedcaa0aa4024cefb6de52ed7ae789dd5904d15323c379d87c67f0a70726cdab2af494da8ac9143a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 40475f04f2900eca71bb9dccd55ae5be
SHA1 ad461ca3ca684cf2d492bd5c03e6635e89f6fe79
SHA256 5431f237b703a409c22e37dcff4fe9cf7bb4b2371bad35718c5dfb2ed854b2bc
SHA512 c6c704276bb37c747a92a4a6a02d91797c537258346b52cd30e69cd3e8d85242ade34d64f32a59adb31244b378b1be7cb2f55aa8b27deb5be00a4e8ad4f9ba26

\??\pipe\LOCAL\crashpad_952_UFDSNNMCYODPUWXI

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 37495308b826fe07f3d2fc9e80f50d2b
SHA1 f7c8f6007433ada878fbd49f9d4969e60ed7b78d
SHA256 97911e1b6fac90063502fd16c266123dfc78b3a2ca022e83315502495eeed93a
SHA512 32a55fb384c25977158f4a15b11907c91bf261b2f29a1eb265fd3ee0b34d1b9cb1df4404bc46b8a7932fe55a6bd261fec8cefd4e6ba69bdca6eef19f55a4ed2f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\temp-index

MD5 f776c55f6b0369c6ac0e3c364f6521e6
SHA1 4309eb7487ac1add8dd05a6079218688be418de1
SHA256 c7ea6448dc78fd427d73be4c084e83aac9c7b8abb7debcd8ba4e5768ad9d9b4c
SHA512 f0e3d0d3b34cf85faaea6751dd959a649cde083899848858c178af9baf2d3743f3ceb41be2639d1e99808f6425b99e1b4d8edfd36788a18d1b43de96e0646c4d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 52fd464a0d1dc76de0891fa5e4edfe81
SHA1 a967cde5707373bdbbd805eecd1dd74bd19ae7be
SHA256 e622b74aa997014f0d7347b4a35f6565e88ef71eab7f3e642c13739c27aaf0ac
SHA512 07182b912aa56048527ce3b7fd2fef9f88c5c2c0b8c3e15194aac7d48c8c39c8ca727b1fe0f6874e7435747f2a25fa4e719d345cf9a006fc403b76b8bbfe7d5c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences~RFe57d4b5.TMP

MD5 6638d393c779d5dab58ada7f86749be4
SHA1 2ab783c5429953dbbfa71da96493eeb6e6a41779
SHA256 5d7b0ba48621e10d36ca989a362a317478b891b6f53c2a31c4f41b19bc6b0480
SHA512 d848b72050b8dbf9d286c99257821dfff206908b3cb3787f5ead04ac29b42e0cabb8967a85d4d4756acc4fcd1dcfcf2f2ac119a1350e0fe05b954ea988bed266

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Cache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Microsoft Edge.lnk

MD5 41f0a0446ad56aced5a8d3e1342e7f1b
SHA1 4727d02b4e1f85ae699cb9e5378e4c0c26f55aa2
SHA256 832d648fecc271822ce334762a27711f5a0d8fb734af77e2c6888a46407ca9f0
SHA512 02c6a5791eae25a055a49f007ad9ebc808f476056eb7e4926b73482ffa833d503fb55e0bf59857dfca2a70b33f648c2fa20f159d0bf4e08391cdc2f098b1bd75

memory/4620-246-0x0000000000D70000-0x00000000013F8000-memory.dmp

memory/2500-247-0x0000000000BB0000-0x0000000001238000-memory.dmp

memory/4892-252-0x00000000007A0000-0x0000000000C4B000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 70c645089e7d193ec605f57aa96e9d0a
SHA1 feb32b1ad7f89c13e1b47898e55051969ece96cd
SHA256 a78379d711f2abdab00b43a0ee024ca5d0527ba9ccd8312b852ebb5a1ef57eed
SHA512 6aaf3e9ac54b766e988a2e5a38e22352294e482f58df83f96421e15fd1b6fb9ed87caabcb6d4a7eb801d4c78de78d5b6cee4f0dc0e3a6188417f47a1111d595d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences

MD5 1f9ee12522e3978feef8349ff4425a26
SHA1 2ef6af7b1682253e805984319fa0ac1ba2cbb1da
SHA256 083941659af1f618d264bddf309803c60e8e24d1568e17f5888b29c9306818b8
SHA512 2bf4f9cfc9f6d0160c0980269adb657fedab1f0f26b7b1a07234e8d2adfefb9bfce073b2e128fa08bd5d0e5d412a5c65d8a23324a69cc3f0c71bd5897fd10bf0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe57fccf.TMP

MD5 2c9b2a021c43ddb6b41293522ee0e76b
SHA1 ea0a173524a5e7995df2491d42ebcd60bc111321
SHA256 e7ed8bb5ed58d8f2a5ef691ab1405fb6b0cbfb25ffdffae7f53d29146a9a0bdb
SHA512 088ea2480eef7dc81c27980a58e8410673578e7e311d6cefd10297cc0a94864a6dd277eb9d266466b4f5804a045c92127d0b94c6a70f7030c3084e93ff69908a

C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge (2).lnk

MD5 0dce077ec00748004fd514bd7ca01066
SHA1 6771800e2724d0837ba82e77f19dae72e64ca54b
SHA256 baa7c2b7a016f83e0181bdeca93a81185e02d9ce9f467fb0a8c6eefe3b48b991
SHA512 53205e56b2a356892cf15495f9d7754238aa5dad976d86a77cfcd5bc0d798575dc91b6a98598b5e74900db9bb0ad2b2fedd5631acc35ed587b9fb0de7340db1e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

memory/4620-319-0x0000000000D70000-0x00000000013F8000-memory.dmp

memory/2500-320-0x0000000000BB0000-0x0000000001238000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

memory/4892-362-0x00000000007A0000-0x0000000000C4B000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Local State

MD5 a3338e636755732f6770cdefe00e21c0
SHA1 878ec635c5b14d2bc016c1717e4673bfe19c568e
SHA256 b942ae9c9b578573bdd9ca75c843287742e7b0c70aa314302f4e543f903b461d
SHA512 fe9109dfd51dcdbd827eada2b9e3f3e39d573ccd5a83755a7f1258c88f52fad0caef3066e8df7b70e3fce4d0ddc8e6f8875ad0b4d5f53c71a03f49a78a146679

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Local State~RFe582b03.TMP

MD5 057e9ff23468409c328acb9b67e6e6b0
SHA1 8a2f794f7f67c3ae9796391ee2262863119ba006
SHA256 cc6761803223e98b040ac957d43e064fbcba737673fd4334586dab6a7ce1a72f
SHA512 8af5a87b6749459c578a015e6a83b491777564bab928b6e81ed2d2d487a401513a4fd3fdac52070371118b58d5c653bb2e790113ede188ec2d65fab3ea54c123

C:\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

memory/4620-405-0x0000000000D70000-0x00000000013F8000-memory.dmp

memory/2500-406-0x0000000000BB0000-0x0000000001238000-memory.dmp

memory/4276-422-0x0000000000A80000-0x0000000000F2B000-memory.dmp

memory/4276-423-0x0000000000A80000-0x0000000000F2B000-memory.dmp

memory/4620-424-0x0000000000D70000-0x00000000013F8000-memory.dmp

memory/4892-425-0x00000000007A0000-0x0000000000C4B000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Code Cache\js\index-dir\the-real-index

MD5 b262e142e38e6c17dea48bf3f1c72a8e
SHA1 5ef3d0a96881c9cdf00bae15ed17a0e08801e22e
SHA256 c571dfbef9df269883c0ae5d4c29574dd7abf2f1993bd01a5aa0cea558c29b19
SHA512 f54be6832dde83d3757531477f979afa721cb8952063282613200e550b8ed07a2cce91f6bc661745a769b4202c93abae891edaff0d6657b3fb5c70c1138f53c8

memory/5052-436-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/5052-437-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/2500-439-0x0000000000BB0000-0x0000000001238000-memory.dmp

memory/4892-440-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-441-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-453-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-463-0x00000000007A0000-0x0000000000C4B000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 4d0f0cc4edc01fc6df10d302449de910
SHA1 f9d81d89a37b239f487727da63b5fe206f027f06
SHA256 dde775e516f6d7b91f4f6a4d25d71209fd95e9555000002ee909c9d0334fb001
SHA512 0ecdc6a7597e95d84c0a0eb1aeba2d308d6916d0ceb9a8c10f2b02d8befbcaaaa401d4f4f96e0bfb82e201c4e4e76c1107c630b28c3c0b190d0c1fb0bbb20ea6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network Persistent State

MD5 2800881c775077e1c4b6e06bf4676de4
SHA1 2873631068c8b3b9495638c865915be822442c8b
SHA256 226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512 e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network Persistent State

MD5 97d6aad1fc763e98143443e99f6c8397
SHA1 e5b06e8a6bb7010d7d3267cdc42acc373bcf82b2
SHA256 2642a7e823b55156a48f835c9cdcaf7537a18480f9d2f3ef01e2f4fd22a34766
SHA512 f6a35accdcff3363d028360665d6fadcb15aea99ff24ae5799bd08f6a0418f9cdf137eb3243b975d671dc8b8c23f03ea74df1adae3bb71ac07392fd34a13a8dd

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\TransportSecurity

MD5 1ce067910c8411cee6cd7d2a8bc6be29
SHA1 8019623e751e44128eb8d17427fc3c0ceed62490
SHA256 c4f9c242effd1f987e4ba920dcab452d022cc4104836839321e1330bcc4025d7
SHA512 043ac090334f791d8dc3de521e904e7c3ecd9da1d50a14ec9f6e5d7ffd01fd77457d630c3e1ac98ea67197902808bd35f7062a2c207bad1381aab42777084d65

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\TransportSecurity~RFe58fe41.TMP

MD5 32fc5b7765c0398b68e6b00311852775
SHA1 163d4431ffe292e73bbedf270374f05d8002bf6e
SHA256 d527a88f5b42460dc8351aaba9f38b487c067a01c925628e95eb76aabb25a73f
SHA512 542026f0f15b5b6c8a754aba3ddb865e969f8efe37c9ab922a03ad72e65529217264a43bc11b77551fb23b4b6cac41d23abc07fc27e24b15d0c299334e7e054d

memory/4892-500-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-501-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/1888-503-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/1888-504-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-505-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-506-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-507-0x00000000007A0000-0x0000000000C4B000-memory.dmp

memory/4892-510-0x00000000007A0000-0x0000000000C4B000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\TransportSecurity

MD5 07901f48c30cf87084e668d6b6f67cf4
SHA1 1cfa72ce3ca4886d0eb0ca6f2da3eebc9929aee3
SHA256 55a527e4d75b32a8456c095a79af187f05389f8de296e78695afc81dde0bb27c
SHA512 1a9c8f7e14b8505cffa0293996a2a2da045e0d224d71b75d280406202086e1f18fd655f482ec508fea489b7f4a6fc54d881288a5a78e8ea9a89a97b28a962d88