Malware Analysis Report

2024-10-23 21:51

Sample ID 240910-lb4q3aweqq
Target 0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608
SHA256 0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608
Tags
amadey stealc c7817d rave discovery evasion persistence stealer trojan credential_access spyware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608

Threat Level: Known bad

The file 0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608 was found to be: Known bad.

Malicious Activity Summary

amadey stealc c7817d rave discovery evasion persistence stealer trojan credential_access spyware

Amadey

Stealc

Credentials from Password Stores: Credentials from Web Browsers

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Downloads MZ/PE file

Checks computer location settings

Executes dropped EXE

Reads user/profile data of web browsers

Loads dropped DLL

Identifies Wine through registry keys

Unsecured Credentials: Credentials In Files

Reads data files stored by FTP clients

Checks BIOS information in registry

Accesses cryptocurrency files/wallets, possible credential harvesting

Checks installed software on the system

Adds Run key to start application

Suspicious use of NtSetInformationThreadHideFromDebugger

AutoIT Executable

Drops file in Windows directory

Program crash

Enumerates physical storage devices

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Checks processor information in registry

Modifies registry class

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Modifies data under HKEY_USERS

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-10 09:22

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-10 09:22

Reported

2024-09-10 09:25

Platform

win10v2004-20240802-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe"

Signatures

Amadey

trojan amadey

Stealc

stealer stealc

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5330f2cf0d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000030001\\5330f2cf0d.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\150697483f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000036001\\150697483f.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\svoutse.job C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000030001\5330f2cf0d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\1000026000\58b49406f3.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133704337645974416" C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2170637797-568393320-3232933035-1000\{4E187177-A848-437E-A314-60CE6C9FDC1B} C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 640 wrote to memory of 5076 N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 640 wrote to memory of 5076 N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 640 wrote to memory of 5076 N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 5076 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\58b49406f3.exe
PID 5076 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\58b49406f3.exe
PID 5076 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\58b49406f3.exe
PID 5076 wrote to memory of 1084 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\5330f2cf0d.exe
PID 5076 wrote to memory of 1084 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\5330f2cf0d.exe
PID 5076 wrote to memory of 1084 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\5330f2cf0d.exe
PID 5076 wrote to memory of 1524 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe
PID 5076 wrote to memory of 1524 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe
PID 5076 wrote to memory of 1524 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe
PID 1524 wrote to memory of 2456 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1524 wrote to memory of 2456 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 588 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 588 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2456 wrote to memory of 1912 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe

"C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe"

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"

C:\Users\Admin\AppData\Roaming\1000026000\58b49406f3.exe

"C:\Users\Admin\AppData\Roaming\1000026000\58b49406f3.exe"

C:\Users\Admin\AppData\Local\Temp\1000030001\5330f2cf0d.exe

"C:\Users\Admin\AppData\Local\Temp\1000030001\5330f2cf0d.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4388,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:8

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4996 -ip 4996

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 1020

C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe

"C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x238,0x23c,0x240,0x234,0x264,0x7ff850dfd198,0x7ff850dfd1a4,0x7ff850dfd1b0

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2244,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1860,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=2300 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2424,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=2516 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3320,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=3344 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3328,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=3372 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4476,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=4492 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=4512 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4656,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=4676 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4628,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=4784 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5016,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=5028 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5180,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=5192 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5320,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=5348 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5340,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=5684 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5492,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5508,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6052 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5392,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6308 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5540,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6432 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5776,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6564 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5784,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6708 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5800,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6832 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5736,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6976 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6700,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=5164 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5788,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=7388 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=7364,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=7412 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=7632,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=7432 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=7736,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=7772 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=7748,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=7796 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=7764,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=7800 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=6424,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=7792 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=5216,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6420 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --field-trial-handle=6156,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4804,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4804,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:8

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1084 -ip 1084

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 1032

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=5660,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=7116 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=7052,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=5668 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=5672,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=5704 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=7988,i,10339527885578989513,12180451786339286287,262144 --disable-features=TranslateUI --variations-seed-version --mojo-platform-channel-handle=6924 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
RU 31.41.244.10:80 31.41.244.10 tcp
RU 31.41.244.11:80 31.41.244.11 tcp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 10.244.41.31.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 11.244.41.31.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
RU 185.215.113.16:80 185.215.113.16 tcp
RU 185.215.113.103:80 185.215.113.103 tcp
US 8.8.8.8:53 16.113.215.185.in-addr.arpa udp
US 8.8.8.8:53 103.113.215.185.in-addr.arpa udp
US 8.8.8.8:53 edge-mobile-static.azureedge.net udp
US 8.8.8.8:53 edge-mobile-static.azureedge.net udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 accounts.google.com udp
US 13.107.246.64:443 edge-mobile-static.azureedge.net tcp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
NL 142.250.102.84:443 accounts.google.com tcp
US 13.107.6.158:443 business.bing.com tcp
US 13.107.6.158:443 business.bing.com tcp
NL 142.250.102.84:443 accounts.google.com udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
GB 23.73.139.50:443 bzib.nelreports.net tcp
US 8.8.8.8:53 84.102.250.142.in-addr.arpa udp
US 8.8.8.8:53 50.139.73.23.in-addr.arpa udp
NL 2.16.106.218:443 www.bing.com tcp
GB 88.221.135.19:443 www.bing.com tcp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 play.google.com udp
US 8.8.8.8:53 play.google.com udp
GB 216.58.212.238:443 play.google.com tcp
GB 216.58.212.238:443 play.google.com tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
RU 185.215.113.103:80 185.215.113.103 tcp
GB 142.250.178.4:443 www.google.com udp
GB 216.58.212.238:443 play.google.com udp
US 8.8.8.8:53 3.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 218.106.16.2.in-addr.arpa udp
US 8.8.8.8:53 19.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 238.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 4.178.250.142.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 24.139.73.23.in-addr.arpa udp
US 8.8.8.8:53 edge-consumer-static.azureedge.net udp
US 8.8.8.8:53 edge-consumer-static.azureedge.net udp
US 13.107.246.64:443 edge-consumer-static.azureedge.net tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 accounts.google.com udp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.102.84:443 accounts.google.com udp

Files

memory/640-0-0x0000000000620000-0x0000000000AD6000-memory.dmp

memory/640-1-0x0000000077AA4000-0x0000000077AA6000-memory.dmp

memory/640-2-0x0000000000621000-0x000000000064F000-memory.dmp

memory/640-3-0x0000000000620000-0x0000000000AD6000-memory.dmp

memory/640-4-0x0000000000620000-0x0000000000AD6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

MD5 5bfca15aa84b99438a129e0ecaca71c9
SHA1 85105b5989d512fcc2e3b221ecceb1e71b6585b3
SHA256 0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608
SHA512 55af92d4906f1c3f5e2156f4c7090996859514ea44d2adf37b2dcec8d12e03bfef3d366eb6fed55e96079f86c3e92f4a033d6a68aa810460113abbe9affd6231

memory/640-18-0x0000000000620000-0x0000000000AD6000-memory.dmp

memory/5076-17-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-19-0x0000000000731000-0x000000000075F000-memory.dmp

memory/5076-20-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-21-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-22-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-23-0x0000000000730000-0x0000000000BE6000-memory.dmp

C:\Users\Admin\AppData\Roaming\1000026000\58b49406f3.exe

MD5 f47cc7dc355ae01926f6065316c3bd68
SHA1 6b575930185f216e4fa5116fdcc8906eb9f53af9
SHA256 25741e3975370f8b2c77513a0941ca4263a83ec08e1203c9dd7cfd5c18474794
SHA512 cf076a077130b8dd48f3e27a6aaba411a6c8833ab8b926c99fc3fb66130694db1ce668103c44aba6196705a9722b68da16287ea8a63ffed250bcf92bba68154e

C:\Users\Admin\AppData\Local\Temp\1000036001\150697483f.exe

MD5 38f98be80e6670f46efc8544d762cfd4
SHA1 fcad2e65d0977f0ab297049d5c9c32450b230d2a
SHA256 fb5cdb8d0f5558d5544c7722e616fbb498b501484f6ad0d1e2a2fe8118574996
SHA512 60a0c8f5516b41faa57ec4010eaed39a255ad2c96e58d7ae1273d3ef44196ea50b4f64c52e8301a95e45139ccd52bd9b52d177121ad1c77289bed89ac49c04cf

memory/4996-56-0x0000000000400000-0x000000000247A000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 5b57eb18c876dc8ce83f272a13abcd96
SHA1 26f1535e898c0089ac47ab872d068f069414f7ac
SHA256 a347c3bb8590973a8157fc689afb2a3458d0be3b85007d5e964db8bafdc09092
SHA512 b02c1e7e16eee43052297bb00daa625de6bd56769dfaa47dcc686cac79df591ce07743156b24695f42e04b70a14b4631bf45c831420d3235f45f83bd3d0bc91d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\throttle_store.dat

MD5 9e4e94633b73f4a7680240a0ffd6cd2c
SHA1 e68e02453ce22736169a56fdb59043d33668368f
SHA256 41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512 193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Local State

MD5 5bbe09d664b12a1b63f37c7c4ed49eb6
SHA1 70490662e3d2561f9ea287f01be293791c8371e8
SHA256 94d513349c3c72516d9ca9a0dfd1697f5806006d9da9c5d4b37b2c96ea3d9dd7
SHA512 d323f8c4b0cfb7f346f03da9c150d567efdcfc2bac84d6e8b9011123e8d30fc33a97647e0ed561f212b97203dec2030cbfd08fc806b55b6221656bee43767190

\??\pipe\crashpad_2456_DIHEOOUVHFFTZDEP

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 d6af0a5e387e931af608eb8d6790ff00
SHA1 898b92b6b53c3f8d8e62e501d044c7b9b71eea65
SHA256 64c9499183ec7ea5a770103015b1771f9900c30f6676547befb90fa7ce3efee0
SHA512 3a7042a8528630f0f5ddba0e639c3827fde7d0ff4fff472f8457cea1bee4bc69cba158f55c428dcab5eba3178805367268cebe73f408bb03b143840f62c0a5ea

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Local State~RFe584fc1.TMP

MD5 e9cfe5dd32e3b9e71b0187959f8a676a
SHA1 7e92cc46a5e2eb00dc4765598bd12ae710c00505
SHA256 9c80ae45b3459cf6fe9b0206fb90b6dd80de78d8df9d43786edc7ec689ef0e9e
SHA512 28ac872b79463d3108eec514c83b8e764decb5eaa29c4e339eeaffcc2833c77c479f8617248cf317a2e985a94323cd4feba1d8d2a8e9f532721382acd13a6c8d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Local State

MD5 0cca8f12e2689d7e7847a1366d133363
SHA1 49eff8f40948e84aa674102faa1cf68f883787dd
SHA256 ba83fcf138545401e5df5bcd178aac88f0d220e5451cd5985834b70f07a11996
SHA512 b41649dba10e88d6eda8acedaf35be007909327f37d1099d9e8e3f63b2e076954077466d57a70dd3d93779bc00e4d8f9fa6e2e958f37db41c59be14db4a4099b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\DawnWebGPUCache\data_1

MD5 d0d388f3865d0523e451d6ba0be34cc4
SHA1 8571c6a52aacc2747c048e3419e5657b74612995
SHA256 902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512 376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Rules\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Rules\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Local State

MD5 ad499de477d8ce988b8ff4324ee5c163
SHA1 4ac71798e8a5d85d93991b1e84042d274c8ff51b
SHA256 91e80d5d1a3edda3ceac830efb634ecb6591822f195e34a0ed2db9e6cd40fc06
SHA512 81a823db0d8ac46593b3ca0bda0e7b8dd9c3951da4470db4c551d661f6082ed83d2eaec8cfaf903f0f01adf6c714a4c0c495685ea67c48bfbd70668aaffeb6c8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Shared Dictionary\cache\index

MD5 54cb446f628b2ea4a5bce5769910512e
SHA1 c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256 fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA512 8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

memory/5076-318-0x0000000000730000-0x0000000000BE6000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

MD5 a3323e9c395b2b30222879502b684f6d
SHA1 2054698347664ac0fc8f5484cd13cb62bae2d338
SHA256 1a2ef92b6aecce133671c032f5ddf7523dcbac5aceafe0e98851653000573df4
SHA512 e9292dd0dd521cdd2c1236f0f770c50e6ea57950994ef393a55f500610f59a8227f955f26612282881b18eb4d5263b30cb189b05a9c6dab783fafac9e7c32bb2

memory/5076-348-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-347-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/1084-352-0x0000000000400000-0x000000000247A000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Local State

MD5 4eb45ad7fe3ef3cb405ae5890c50bdf7
SHA1 53bc0cc9879da89cd22347975aae56219a299768
SHA256 623d2aa22d55fd6876b59f2d725a63b08f8efa24a96219d5a94eff2ff888da1f
SHA512 60beea3773c6377788b98857cd13b523bb41f4debc5cb8fc45ac43fed97c05835420e2832fe4e551b738058e6cfdbe9012ba141e4bb1b4bb55eff60133ffe0d5

memory/5076-380-0x0000000000730000-0x0000000000BE6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\DawnGraphiteCache\index

MD5 235671cd49fd91cb93806cedc61144ca
SHA1 b336b10da0f032fd7888cb91a0f1f21cf5f05eda
SHA256 525db64e8aac9e699e2ef32d5e67984a19861fffc012f483c8ca9216de44cdd5
SHA512 f88ff73805b2e8dd5b3969f097951eaf4d459c6c2017de99c22d97e32b649c5859d3a51caa871de6cc58f79bdf7faef98608099e33e5605b4fd33c12346fbd2f

memory/3776-476-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/3776-477-0x0000000000730000-0x0000000000BE6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\582b0b12-5a8a-4a4e-b750-e7176b8b8ad9.tmp

MD5 14321ea7d58c33f36a2c0cbd2c14cce9
SHA1 4b4387dd81e9b376bd236736c4296448a4fcdaa5
SHA256 fc24fda70b4df5aec7bb333242e26ae96cdc792b9e53162b438c13769105ce17
SHA512 ee890615aea81648b7c42726aee91a07dbbfcb1b52c4655fb3d05bf7a84e3cc8cbae3f48162d7c1b306777bff5b112bbe3f33419899f9679ea1852c08150bee6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\the-real-index~RFe58a1e8.TMP

MD5 dbc7336c2cb7e3f2c98481b7aa7cd809
SHA1 cb420d79984f82328a159770ec6595ab0a3b9e83
SHA256 4ef6698c5ba82ef9a5f3293ae1d245f4da79aab2591dfef58e8f9a0102fddd5f
SHA512 433820992200e724aadfa17b5f175f5650c24a743aa04b59248d9d3e7f31d9026817fdd900929cd4c5605ce42d0e04825662a0a38afbca1f829f0816f8ba82c8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir\the-real-index

MD5 9f76864b0de2d66cdc29aecee551d08a
SHA1 83afe4b781ce358030703900ccac01cf07560fd6
SHA256 0ca7f7630662ba8705d1fd14dc4f4898cd4f2297a73a357cc2a51d60132f1671
SHA512 3be2081d592b3e4e00add3aad9578f7b2262dc16901e563b431bd83299f786fd4a8ac5f5edd070bfbb2dd8be009ea38fdfd4b29630cd457ff8879840523fca14

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Code Cache\js\index-dir\the-real-index~RFe58a2c3.TMP

MD5 f995ad334b9e9b4ffe1412cd73b0f6a1
SHA1 32499d15930aa89a8a8b877d8699beb870b3a64a
SHA256 f10e528ab83de646c7585da383d205d0fa772b2db33107b2f73a3bd2d43523b1
SHA512 a014c19422110b6e0493546a47bad630e900eed2031a038a07fda227e3df3cdaaa3834fe5d72055207067ee96e697160a1231e7d9b31e04ec45fc2c8f52f51d5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Code Cache\js\index-dir\the-real-index

MD5 bedbe591977edc359f1a25c71e2074a3
SHA1 66e3e5777d687da816085fd6bc134fdf005e80c4
SHA256 3ef5c4240755ca3451f6abd90857b54603bc1250fed1d1a9ccf131c27315d949
SHA512 7bc3e6816175a577f3ea122612dfe69bc754d42312c7bdaacc73b0b3f669cc4c9e3858779e8343f17e53fae670744f646a0e8e29cd3c64f2b407fbed3707f4db

memory/5076-505-0x0000000000730000-0x0000000000BE6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\097deddd-bfc4-47d2-a9e3-378adea134c9.tmp

MD5 5fa8eb5cbffdf6e30b2c77117ae8f235
SHA1 e7f9916bcd2322bf46ae59c623498016cdc146f5
SHA256 d2981bd9e82a86d671df9c1035cb04f00f86faf06e555eefdd52a43ce6819b69
SHA512 51375b2485d96751674c1766d8f3551faac9e741a02e1ea88299849a26745c90bf600f65007326d0a112056213aaebbaf5203c27efb2e8c164930a3836866806

memory/5076-520-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-539-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-540-0x0000000000730000-0x0000000000BE6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Local State

MD5 8ff6bc945d8df4880a917da8a2be17eb
SHA1 48271fb156c72a6a21f44eb20115320f23de4b9a
SHA256 d7e022ff79cb3ef890240e2113939e2f0a7ef4a2133bdc61b0a007e39266d663
SHA512 0ee2aa06c97bbbabf51da7e9a60ae27f924e1d04ffc5ff11b02b8cab38a7ed955cbc6e24243af2736148b5f64f22607026c57aa2e0e15bd13600dad45a076969

memory/5076-551-0x0000000000730000-0x0000000000BE6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network\Network Persistent State

MD5 2800881c775077e1c4b6e06bf4676de4
SHA1 2873631068c8b3b9495638c865915be822442c8b
SHA256 226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512 e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network\Network Persistent State

MD5 fe8e2eeca47a32aaeb376eccafa59459
SHA1 88b8bd6d1337fee21135bd3fd7dd541ebcbc5cd3
SHA256 e227d2dc33bfb57872de8815f4700f4e52be607d770cd648f884e7e115a5e3c3
SHA512 56783d5890c9bfd1f45d596a4eeaf1abc221d29e17f79c86156a8f936fa5841a06abb051390cd7736cd915361401de978e94d7e66459ddb27be8378db17ec5de

memory/5076-579-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/3840-581-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-582-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-593-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-594-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-595-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/5076-600-0x0000000000730000-0x0000000000BE6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 7e8adba352f1011a5b19699709807a11
SHA1 61ce4d26e28883acfd935f9a9276c59f1e716923
SHA256 9da374e9e1c78fb9b43612b6fa53d994a1c0d259c5279682b68f82f09a9a79f3
SHA512 d0449730ee3584afa9f5736da60aea48414112f5ec0b0e0c155e1b2b35903c734876bb29b3c34a26144531b34720879352641c3453ee522538fde14969373405

memory/5076-619-0x0000000000730000-0x0000000000BE6000-memory.dmp

memory/1528-622-0x0000000000730000-0x0000000000BE6000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-09-10 09:22

Reported

2024-09-10 09:25

Platform

win11-20240802-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe"

Signatures

Amadey

trojan amadey

Stealc

stealer stealc

Credentials from Password Stores: Credentials from Web Browsers

credential_access stealer

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\ProgramData\IECAFHDBGH.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\ProgramData\IECAFHDBGH.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\ProgramData\IECAFHDBGH.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine C:\ProgramData\IECAFHDBGH.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe N/A

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Unsecured Credentials: Credentials In Files

credential_access stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Microsoft\Windows\CurrentVersion\Run\9567227e4d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000030001\\9567227e4d.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Microsoft\Windows\CurrentVersion\Run\5330f2cf0d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000036001\\5330f2cf0d.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Checks installed software on the system

discovery

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\svoutse.job C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000030001\9567227e4d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\ProgramData\IECAFHDBGH.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe N/A
N/A N/A C:\ProgramData\IECAFHDBGH.exe N/A
N/A N/A C:\ProgramData\IECAFHDBGH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3184 wrote to memory of 4864 N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 3184 wrote to memory of 4864 N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 3184 wrote to memory of 4864 N/A C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 4864 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe
PID 4864 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe
PID 4864 wrote to memory of 816 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe
PID 4864 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\9567227e4d.exe
PID 4864 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\9567227e4d.exe
PID 4864 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\9567227e4d.exe
PID 4864 wrote to memory of 4168 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe
PID 4864 wrote to memory of 4168 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe
PID 4864 wrote to memory of 4168 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe
PID 4168 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4168 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 4720 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 4720 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3864 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 3540 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 2172 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 2172 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 2172 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 2172 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 2172 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4852 wrote to memory of 2172 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe

"C:\Users\Admin\AppData\Local\Temp\0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608.exe"

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"

C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe

"C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe"

C:\Users\Admin\AppData\Local\Temp\1000030001\9567227e4d.exe

"C:\Users\Admin\AppData\Local\Temp\1000030001\9567227e4d.exe"

C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe

"C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb40523cb8,0x7ffb40523cc8,0x7ffb40523cd8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4496 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6444 /prefetch:8

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\IECAFHDBGH.exe"

C:\ProgramData\IECAFHDBGH.exe

"C:\ProgramData\IECAFHDBGH.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 816 -ip 816

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 2264

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3160 -ip 3160

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 1096

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,16804855893254910567,2231176888822543812,131072 --disable-features=TranslateUI --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4428 /prefetch:2

Network

Country Destination Domain Proto
RU 31.41.244.10:80 31.41.244.10 tcp
RU 31.41.244.11:80 31.41.244.11 tcp
US 8.8.8.8:53 10.244.41.31.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
RU 185.215.113.103:80 185.215.113.103 tcp
RU 185.215.113.16:80 185.215.113.16 tcp
NL 142.250.102.84:443 accounts.google.com tcp
NL 142.250.102.84:443 accounts.google.com udp
US 8.8.8.8:53 227.179.250.142.in-addr.arpa udp
GB 216.58.212.238:443 play.google.com tcp
GB 216.58.212.238:443 play.google.com tcp
GB 216.58.212.238:443 play.google.com udp
GB 142.250.178.4:443 www.google.com tcp
N/A 224.0.0.251:5353 udp
RU 31.41.244.11:80 31.41.244.11 tcp
RU 185.215.113.103:80 185.215.113.103 tcp
NL 142.250.102.84:443 accounts.google.com udp

Files

memory/3184-0-0x00000000002B0000-0x0000000000766000-memory.dmp

memory/3184-1-0x0000000077C96000-0x0000000077C98000-memory.dmp

memory/3184-2-0x00000000002B1000-0x00000000002DF000-memory.dmp

memory/3184-3-0x00000000002B0000-0x0000000000766000-memory.dmp

memory/3184-5-0x00000000002B0000-0x0000000000766000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

MD5 5bfca15aa84b99438a129e0ecaca71c9
SHA1 85105b5989d512fcc2e3b221ecceb1e71b6585b3
SHA256 0036da167596292c2f220a56d91f927b6d8998018904fc0cf8dc6e4e4fcbc608
SHA512 55af92d4906f1c3f5e2156f4c7090996859514ea44d2adf37b2dcec8d12e03bfef3d366eb6fed55e96079f86c3e92f4a033d6a68aa810460113abbe9affd6231

memory/4864-17-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/3184-18-0x00000000002B0000-0x0000000000766000-memory.dmp

memory/4864-19-0x0000000000E11000-0x0000000000E3F000-memory.dmp

memory/4864-20-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/4864-21-0x0000000000E10000-0x00000000012C6000-memory.dmp

C:\Users\Admin\AppData\Roaming\1000026000\72409740fb.exe

MD5 f47cc7dc355ae01926f6065316c3bd68
SHA1 6b575930185f216e4fa5116fdcc8906eb9f53af9
SHA256 25741e3975370f8b2c77513a0941ca4263a83ec08e1203c9dd7cfd5c18474794
SHA512 cf076a077130b8dd48f3e27a6aaba411a6c8833ab8b926c99fc3fb66130694db1ce668103c44aba6196705a9722b68da16287ea8a63ffed250bcf92bba68154e

memory/4864-54-0x0000000000E10000-0x00000000012C6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000036001\5330f2cf0d.exe

MD5 38f98be80e6670f46efc8544d762cfd4
SHA1 fcad2e65d0977f0ab297049d5c9c32450b230d2a
SHA256 fb5cdb8d0f5558d5544c7722e616fbb498b501484f6ad0d1e2a2fe8118574996
SHA512 60a0c8f5516b41faa57ec4010eaed39a255ad2c96e58d7ae1273d3ef44196ea50b4f64c52e8301a95e45139ccd52bd9b52d177121ad1c77289bed89ac49c04cf

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\throttle_store.dat

MD5 9e4e94633b73f4a7680240a0ffd6cd2c
SHA1 e68e02453ce22736169a56fdb59043d33668368f
SHA256 41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512 193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 4fc9544bd04abcf4a7ecee75ee9e93b6
SHA1 373b1fd09c4311749c71c39f3feecaafe73282ed
SHA256 f1b0b8417d28bc52836bdb7319033d1b0c2efa518fc013a560327b7c96378146
SHA512 bcc3d9fd30fbb2f3e24771822bb1bc086f126bd13498ee7c7b6e3afd9a35d42c219b77b7bfdf131554ff57463bb2e78110ae9344017e5e9e20dde1c00f250e9b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 7ea170a4a4d60b8fc441cd45bafcf1e0
SHA1 2c107245be67696c7801a4212de711f9cd0b8f9d
SHA256 df8fca8233ac1b00dde8a74237846b6351d3b3f91af86e5eda6c773c1c7b2b2a
SHA512 4b755db4a26ff2b26a5516311bad74a86a3853d830d61513ab9fb289549382eb6fb61b887f2abf79b57110f345042e977a0ca973986f74c8c55bff8d92178b4a

\??\pipe\LOCAL\crashpad_4852_WPUEJGZBVWOREYEV

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 590946ca83b864e73f30fd1cccb4110d
SHA1 38a4144e583396a5bbe6df69bd1d6d6563d3eb02
SHA256 4ab48cb7eca45f4409c246e504f13de206e1134960c257042ad2b49d4af0add9
SHA512 98e8fed6182b134083d9fcb05dc94210c20002f8b912aee6e785c2e426c611e412450958c0e68e2201eeddccb9bd1a2af020358c85c1429d9afd7fccfec4d0d1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir\temp-index

MD5 cd22ea8de861b0eea758fb7773a25ffc
SHA1 d8ef7176c0d787820516abc799f6a3ae3d9c3db2
SHA256 3041d0353e89960c2e4911472eb6c8201a5a248b7ebcdd0834f26b3641cab9e5
SHA512 f6739e5d3b46c4618163ebaa96771ad9879ff255a13c399286002dd56b6b8b793dab21a35e775ccf97e554f04d3f6236ef4b4acb900e18fb329281e220b26a12

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 e07a3f69a3b2c9677890a6cd61ee6dd6
SHA1 01c966d79cbd71b9a1823dabdcb51f640dc63c38
SHA256 881b5be559a74ca77922e9f5b587e1f738d240bd8ac9a22070f0925687c49b12
SHA512 a7eb034318841beb50e8eb280699e8a09fabcc8bd6904c5ff82605716c4abf68391911c53cc83d88c824245a8b595287055215941a3a2a520c508a167030979b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences~RFe57c757.TMP

MD5 26c40020629e3d30e1a1a404e2f2d05b
SHA1 54064566aa14b329f248d049806668fbff0eb1e9
SHA256 8c134972defbe0426d0865356de406a27ad9f5ce1fe151591ecc89dad31b7f42
SHA512 5de4972a00c9549f6c1fce66375a57bc7786df85fd47eb9c65bd9f8865df2d4347265b863407c7000e598762689746a508db452fbf49fd0c5c97cc1fe16a2f19

C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge (2).lnk

MD5 46bee07c0bde6a7f0ce5ec208e5163c9
SHA1 1ff97f37849981903e68258abb94aacbc6cdf8e7
SHA256 f880bb376d773ad5954071628d68b5bd30fc7bc1b07d5d3ecdcbcd5b5f869e24
SHA512 f7b8516f42f42b9ae68bd294c6e56e3a7c7fd36d6acb5f7dbb047cc37271f49ab353f57fc5b753b46b52980481ab277057262c76926290561d9d6c5a9ec58d3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\GrShaderCache\GPUCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

memory/4864-195-0x0000000000E10000-0x00000000012C6000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge (2).lnk

MD5 bd873784a1dd2924069bdf581011936f
SHA1 1a3a604a2fbce8466c9999cdba90db5c0d523eff
SHA256 8fca2fbb6c26c4744c02cce46603af415dc619adad31212fa8687f57a3353937
SHA512 605a68d1def99a14f9b6bd1e2384bda5c6d441bcfcd5c9d3663a4e12901d9676681df7d42bfe2a132441a8bf1542ce860714841831d5b3faad7434b5338d6c8a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

memory/4864-254-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/816-256-0x0000000061E00000-0x0000000061EF3000-memory.dmp

memory/816-271-0x0000000000400000-0x000000000247A000-memory.dmp

memory/3160-289-0x0000000000400000-0x000000000247A000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 b846ca511b036bc5888be48cba1bc689
SHA1 73aa9667456bf00af7733d48b22021671fa89b3b
SHA256 60d20c6cef3406123befbc4c66040c3342a6cd1418108a6a4298b0cf99b09483
SHA512 e6948ad96eed592aa387aebe1ac20d9cff3935f0977baa603f4e8fa3f1d87d015af5cd7ff0c28684330955abc6805118ba363ae99c79b336a62a4594ae038a3d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences

MD5 07fdee4868ca99c9d890acf7402aaa5f
SHA1 1555083da4339979eb0597d3a8a12b945d4b6904
SHA256 f9d31fd3a0d645e15ced2ae959fdbd9c643008414f617737b1a465b164338c10
SHA512 af80b20c812091aec785eebb3090ced8a59155645366098a91cf444912de5453724bc010d0439ad883a7a7ce454614fa2dcda76865073948264f4bc764353642

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe57eed4.TMP

MD5 e0f722a3eb20a64061a8cd110f3d59f1
SHA1 3e52ca0652a038762f2d95d8dca3cb349b644ecd
SHA256 63005f10180bf8f31b99199401a1963bcb708c6f5a46c19b5c35996fb8c98714
SHA512 072aef3f7c54dce1d77de36ab1bc302bb6288cbcd2d7bcaad2140614a534650714a8986e6e2c7dbbf0ca2886e3c41b61c5243dda6bb47d22348c818226059a8a

memory/4864-325-0x0000000000E10000-0x00000000012C6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

memory/816-377-0x0000000000400000-0x000000000247A000-memory.dmp

memory/2624-389-0x0000000000DC0000-0x0000000001276000-memory.dmp

memory/2624-390-0x0000000000DC0000-0x0000000001276000-memory.dmp

memory/5004-392-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/816-393-0x0000000000400000-0x000000000247A000-memory.dmp

memory/5004-394-0x0000000000E10000-0x00000000012C6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Code Cache\js\index-dir\the-real-index

MD5 388c3564042e3d4a4c6e61e3c7bb9dcd
SHA1 38be22e66fdb0b0acea25280a295a418a94e67c1
SHA256 e3fc7c62508ea2a16ea0edc1a90353571d58fa383810e82fed8627b930403c9f
SHA512 dd9d1d01ac9072494ed19828e94534985652649e937b421508048154acd2c2e7954c53929edd9c5272d80172e928aa84a836bbe983edc9a03e8b91849b9d2672

memory/3160-404-0x0000000000400000-0x000000000247A000-memory.dmp

memory/4864-405-0x0000000000E10000-0x00000000012C6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\67b15217-7747-415e-bc89-1210550147bc.tmp

MD5 348e2fecfea561adc10605c37770c38a
SHA1 9b8563aa69cff9b3f16a3ed42edfc410acdbf478
SHA256 d38b30417e563cc20fbfe4e7ee41cb427e2ea3d1733f4812236005a695d72cad
SHA512 6990af4131849d1fb43dd26b73a9dcca9e6722343d0bd6e6ef7ae6b2a93ea31b72938264f99574350f5e5043987fee87ed0ba208ac23a35b8769abad1c5d8f4b

memory/4864-424-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/4864-425-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/4864-435-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/4864-447-0x0000000000E10000-0x00000000012C6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\fbb22721-55d8-4064-95e5-254ecfaee4c4.tmp

MD5 1894229226b2c03cc0f2aaeed990217f
SHA1 5d6c04aa066b543a0418e5cff0dbdc0117f63588
SHA256 682c044e571d8d5c31de426cf7c3b20c6b8c645873fec7de55b1c60f243f3f4e
SHA512 bdc74e8a34ab46198721ea5e3f26ae95169502debffdd40617a67b8d09f0249df894b13c4160ea67fbbdcdd7dd0b9937c6b9fa65a6796dc9e61504b407d9dd22

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network Persistent State

MD5 2800881c775077e1c4b6e06bf4676de4
SHA1 2873631068c8b3b9495638c865915be822442c8b
SHA256 226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512 e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network Persistent State

MD5 5f7554c5a5e771d9a7874acabed6adc6
SHA1 b18d7bf6d64781be6c7a5fc66faee4c5c27b41e0
SHA256 81641ad723e0cddc4fe8618ea2c9cb516edf75e855bbf8d82e8aa64ee019b4bf
SHA512 09d0348c78e354dc765f0e0e1d888af51d5d2a3bafd5c7e9b7934da2eb47bf72bd503a828230a8aee191690fc48b52a5a06637565ba59b2263a8db6d5935af06

memory/4864-475-0x0000000000E10000-0x00000000012C6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\TransportSecurity

MD5 ee0fe4b22b4518f0c78885c193a75943
SHA1 c394348bea9e9663a98316d692693089aab3ebaf
SHA256 91eeb365a66cbd2d011f7194c9f8c2f73152ff69d631185fe0177625ff81b215
SHA512 91b139c7009403828dadfc099d0ac1879d25ecb6129c2853a168ae6f27058390162f5d9d55aaf54c51d2db42c79b0289f7cd4562e4c8ea722a5246bfd9879ec0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\TransportSecurity~RFe58ec3f.TMP

MD5 4ec317c5c36405be12be9eb59d5efa4d
SHA1 ceb919b464a973a460a7dfd05e30daa8cf51a178
SHA256 7d8385207d907787d35cb828b1226daa8992cee67c3b832d93ad9ee7ce8dac1b
SHA512 ade8a10cf49502aa2011d921f8f89a271f9c20c84a4181d28f543d06a3c371b9ce94c6ed1e64093760ead773eda728a97fb2d8515ef07346953ecff10c3143ba

memory/2164-486-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/2164-487-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/4864-488-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/4864-489-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/4864-490-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/4864-491-0x0000000000E10000-0x00000000012C6000-memory.dmp

memory/4864-494-0x0000000000E10000-0x00000000012C6000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network Persistent State

MD5 3f816839007b0f1b3ca62d73a1751c1a
SHA1 c91e403c6926b9ca645ed4213a512a09174ebd2b
SHA256 363d837abba794b979db43447e3ce4b1834ed029131ff419ecef256576e0413b
SHA512 7ebf50e94cb9e577b1b9d2cbfd40db440956d91d63033ae602dc48f9ef0d48ee3bcf7c16027c2ea9e0a7f49b2d47452bcbbbd3883066b5220900f5c9d7e2e641

memory/4864-506-0x0000000000E10000-0x00000000012C6000-memory.dmp