Malware Analysis Report

2024-10-19 09:08

Sample ID 240912-d9tprazbrl
Target 4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b
SHA256 4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b
Tags
amadey stealc c7817d rave discovery evasion persistence stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b

Threat Level: Known bad

The file 4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b was found to be: Known bad.

Malicious Activity Summary

amadey stealc c7817d rave discovery evasion persistence stealer trojan

Amadey

Stealc

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Downloads MZ/PE file

Identifies Wine through registry keys

Executes dropped EXE

Checks BIOS information in registry

Checks computer location settings

Adds Run key to start application

AutoIT Executable

Suspicious use of NtSetInformationThreadHideFromDebugger

Drops file in Windows directory

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Unsigned PE

Suspicious use of SendNotifyMessage

Suspicious behavior: GetForegroundWindowSpam

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Modifies registry class

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-12 03:42

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-12 03:42

Reported

2024-09-12 03:45

Platform

win10v2004-20240802-en

Max time kernel

149s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe"

Signatures

Amadey

trojan amadey

Stealc

stealer stealc

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f5c0d9b66e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000030001\\f5c0d9b66e.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f5c0d9b66e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000040001\\f5c0d9b66e.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\svoutse.job C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4528 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 4528 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 4528 wrote to memory of 1800 N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 1800 wrote to memory of 2124 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe
PID 1800 wrote to memory of 2124 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe
PID 1800 wrote to memory of 2124 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe
PID 1800 wrote to memory of 4928 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe
PID 1800 wrote to memory of 4928 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe
PID 1800 wrote to memory of 4928 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe
PID 1800 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe
PID 1800 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe
PID 1800 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe
PID 2008 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2008 wrote to memory of 2248 N/A C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 3620 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 4232 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 4232 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 2108 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 2108 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 2108 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 2108 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 2108 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2248 wrote to memory of 2108 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe

"C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe"

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe

"C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe"

C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe

"C:\Users\Admin\AppData\Local\Temp\1000030001\f5c0d9b66e.exe"

C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe

"C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe313346f8,0x7ffe31334708,0x7ffe31334718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6604 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7292 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6516 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7824 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7812 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9413544694235940557,7180599916419543480,131072 --disable-features=TranslateUI --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=8016 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
RU 31.41.244.10:80 31.41.244.10 tcp
RU 31.41.244.11:80 31.41.244.11 tcp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 10.244.41.31.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 11.244.41.31.in-addr.arpa udp
RU 185.215.113.103:80 185.215.113.103 tcp
US 8.8.8.8:53 103.113.215.185.in-addr.arpa udp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.102.84:443 accounts.google.com tcp
NL 142.250.102.84:443 accounts.google.com udp
US 8.8.8.8:53 84.102.250.142.in-addr.arpa udp
US 8.8.8.8:53 227.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 3.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
GB 216.58.212.206:443 play.google.com tcp
GB 216.58.212.206:443 play.google.com tcp
US 8.8.8.8:53 www.google.com udp
GB 216.58.212.206:443 play.google.com udp
N/A 224.0.0.251:5353 udp
GB 142.250.178.4:443 www.google.com tcp
US 8.8.8.8:53 206.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 4.178.250.142.in-addr.arpa udp
RU 185.215.113.103:80 185.215.113.103 tcp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 142.250.102.84:443 accounts.google.com udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
NL 142.250.102.84:443 accounts.google.com udp

Files

memory/4528-0-0x0000000000F90000-0x0000000001448000-memory.dmp

memory/4528-1-0x00000000773B4000-0x00000000773B6000-memory.dmp

memory/4528-2-0x0000000000F91000-0x0000000000FBF000-memory.dmp

memory/4528-3-0x0000000000F90000-0x0000000001448000-memory.dmp

memory/4528-5-0x0000000000F90000-0x0000000001448000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

MD5 73f3d06a3027d3f7e86b6e44ac5eb905
SHA1 e0608353485f123b49e7a18b880971be24584046
SHA256 4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b
SHA512 5722e0b54a6e8dd56b2f3f9f2b56d82ed48f867231c9faad4f716000d495bb231184e511cd277f697a49094e92a3e38569c770d3f56d45f7363723a9e3128ad3

memory/1800-18-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/4528-17-0x0000000000F90000-0x0000000001448000-memory.dmp

memory/1800-19-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-20-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-21-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/3816-23-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/3816-24-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/3816-25-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/3816-27-0x0000000000F40000-0x00000000013F8000-memory.dmp

C:\Users\Admin\AppData\Roaming\1000026000\ea9bf65e03.exe

MD5 b3a239beeb5dedb7629a68e9ed216d4c
SHA1 f8092284123f59a72267611ef31fb60759eafbdb
SHA256 f539c6ebab703708ab993bacab000fd97274d49364bf0d58a2df6857d7d5d1d7
SHA512 05fcdb1089cf89b6cce19f6535a4e42adf8b2feefb6a273ab082180a3c43cbb55e0ab60a23bc00717e423228144a8825497b62dfecb469d142558148f6455459

memory/2124-43-0x0000000000240000-0x00000000008B2000-memory.dmp

memory/4928-59-0x0000000000210000-0x0000000000882000-memory.dmp

memory/2124-60-0x0000000000240000-0x00000000008B2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000040001\f5c0d9b66e.exe

MD5 c5090cfde317cb004d4ee929fbe966bf
SHA1 62707964fb1e4b3003a208c088a7976cd317d374
SHA256 b736c6b7105621cabf5402e769b37818e51fb96a2308413c959a0a642cd603f2
SHA512 49c2219ccd4058277d298b023ca3592e97e9fb2e4df33a5971b042dc632546158439aa37a1ed6a5096cfb23af45cfdd07b2fb84a411f6464e120d7764bd687a3

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\throttle_store.dat

MD5 9e4e94633b73f4a7680240a0ffd6cd2c
SHA1 e68e02453ce22736169a56fdb59043d33668368f
SHA256 41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512 193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 2fe27ff8edde28133b4cfdfc5ffaecd5
SHA1 ab6070606079c1ad7ce5b959283735ba226331a3
SHA256 c47d8da14416c18fff5d5bd4816e94839f239ecdfc88b942faa0fd39c374a1a2
SHA512 6299a89089a991d7dfcbb1b65fd3fc28ed31b49ec2912a992acb02e1c26e0d3c075af91bd17b9348176f69259ed009d03eb4bd1993456c5f09a8da5d74502673

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 dca3f0548b81b6d35d313e19043ff321
SHA1 f7a37942ab0e9761b96c7aa066d504aeb2760b40
SHA256 0b18d3f9ff30f9f83bf39cda75f816331df6d60ff99ec629750d3218abc83227
SHA512 88b13dc72b6b5d47dd84c0a91ec192066d7954a13d512c0e0161c25f342b8825478c7daea1d8fec0ec7fd37cce83d929d9de17770cf81a84713aed85d60683d6

\??\pipe\LOCAL\crashpad_2248_JRGEHDSKXDWQYGGF

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Sync Data\LevelDB\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Sync Data\LevelDB\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 1f924f788d410e16843b6e9737546202
SHA1 ddd0cc45bfb6e4d7cd194d9cf79d7fe0d768809c
SHA256 209a6f8ce3156a2b01cb87e27b69a5427ef80e8e68368790b328affc5b3b58c1
SHA512 862a5d8eff3474797beb123e9f0c56528656f014ec88f1536f142838d2f5c80822fca0843289810881b08417eab29645c9d2b54d2582290643b5e8949e9336b2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir\temp-index

MD5 4fbeaeb81e8cf89d1cf5bc6711864f87
SHA1 93657904fd6c3ee856a985b23fb17802a6cfd1ab
SHA256 3af7bf4f087f277b847c7a8b2540228763af48187bdc00ec255458563c0cafb3
SHA512 f2031c0ace0aeb3a749953a2e4fbe595017fbc5029fdf071a3d17fd9a2a2e8178066c80d1c76ce1d74435e310e6271328890fdc224901fed43669dafcb776c8e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\317e048c-fe93-4b89-91a6-c1bb3764788c.tmp

MD5 8f930011231164e999651e68d728a869
SHA1 3e885b6d1e8918ef1a0afb6a89070552d3d7833b
SHA256 327a64cc48254dab147405997bcc9b8519fdbde73631faf2b1b88a32e35aa134
SHA512 72baea8cbee82faad2fd43f69e1daf1b8ca6b84f75772ca4df3a56500cea30251119e598db498a69297c6d366142e688647908f30dd9573aa8ff25365a67a548

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Microsoft Edge.lnk

MD5 7831c40c306765cb50cd9915aca49d9f
SHA1 28e2f523024567606348668e9d098bbb6a994f00
SHA256 90236cc0c095a57a3ad54fd6e7ae11f4fc4aa25b88cbff5168491b810c955ede
SHA512 ed054d4883350d743aac97eb8fd630cccc653175186870ecfc62a0bfe225c15b69e11642ee4a4d7afa0c67c18c40882a144f72b3fc72a880aaa352f5f7ca63ad

memory/1800-182-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-231-0x0000000000F40000-0x00000000013F8000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SF7S9H3T3UT8S9KE453F.temp

MD5 5f80002d080ea8ac3584a7ffbc2476fb
SHA1 3fc4775d73097676591eb7313a7ac2b9f49d866e
SHA256 5baa76011597c8182f1157e1304875f8afc0b0814d0154c89979d5545993920d
SHA512 400457ffdffe5a67416a0db3ebf16576af41a0b501c746a84cf2459f28f2aacdc740388a703dadba9dfad957d59098c45630489bde2bddba7c35febeeae9243d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

memory/1800-267-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/4928-268-0x0000000000210000-0x0000000000882000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 c330d79ad303b1bb008074d7cb533588
SHA1 8a1084c44964426ecd4922bfc083b3ab48ae5629
SHA256 761e75dfc00c8e28f759dc8461711a69e6edfd503ac5b3f9dff437acb25454b4
SHA512 682df19119de9f9e70e72dfc76d6dbae10d99d96db4e7d098fd5447dfa705c2d2cbc05da6e666648fb4c0a8945f98cdd1c1ae2ed7cc41fbd32cfed8f252b9c9c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe57c709.TMP

MD5 0ef3df3c17fdeb2cf3b2262e051da04a
SHA1 a1454a717adb176f500d97ae6e77fa706e8d3721
SHA256 6910fe582b1fd9bce75a093e527d2d0a090d1604b54c0dd743b70b51aa2798f9
SHA512 6ddeb618080ff01a22d264ae2cec4496ddbc7966104d76461f9b2faa509cf1f124fd004af39693e5f5ce5d8f7eee9c62287a2caaf89eba8adbbd66c70397e44c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences

MD5 bd38a187f97b5e05fe0dcb6147cc457f
SHA1 919f51bb20f386831a3e7a04042a5ac01966469c
SHA256 1572f48c11903f7dad9b53be131726ef8a1325b88c1d3949ff70ae78d358ff3b
SHA512 7a6c7a65b1ab9aa44f48e3ac6f040ce74009eb57c1144512e50866e0c9fe1dcf74cbf0cd323786876fc80feaeec22b06d3ad4ee93731b4a02417950943bd7765

memory/1800-293-0x0000000000F40000-0x00000000013F8000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

memory/1800-346-0x0000000000F40000-0x00000000013F8000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\f8b0680d-e278-48a7-bca3-4298f53d4d98.tmp

MD5 3ab022d56c57c83430a698a4373780d3
SHA1 cf49fa6aa6305dde230c7d295ae879d4a146550a
SHA256 ab689cbd6983c1fa2447c21f8fa806f6127409c8570a5bd72402ec3751b41eae
SHA512 4f7c1899717e63d752d15e4955ac4a46422181481333eee669d15d3e335409837f2906f1c5c1b41be7a89fa5dc183813c5e6399d4cc3db6837d941e2dd0360c7

memory/1800-365-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-366-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-376-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/3028-379-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-389-0x0000000000F40000-0x00000000013F8000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 69532a299874447447c551606a555f03
SHA1 020c4bafec36a7f54e3ae73705394a6361332622
SHA256 f09b2292f5671d5a3ef3520e81933a7d7b819bade253f97b7cd2f8888904a28f
SHA512 e6c3651c19bf51ef10cbab4fa66caa67aac98d56e196e28dc08d1f3affc2ab4d2c1ce10480f0168f5e7202da6abb65ae8629e5a4972eed8de01e68046f5b60d7

memory/1800-408-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-409-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-410-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-411-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-412-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/5568-414-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/5568-416-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-419-0x0000000000F40000-0x00000000013F8000-memory.dmp

memory/1800-422-0x0000000000F40000-0x00000000013F8000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-09-12 03:42

Reported

2024-09-12 03:45

Platform

win11-20240802-en

Max time kernel

149s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe"

Signatures

Amadey

trojan amadey

Stealc

stealer stealc

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Microsoft\Windows\CurrentVersion\Run\4c657176cb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000030001\\4c657176cb.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Microsoft\Windows\CurrentVersion\Run\9968150715.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000040001\\9968150715.exe" C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\svoutse.job C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1956 wrote to memory of 1412 N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 1956 wrote to memory of 1412 N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 1956 wrote to memory of 1412 N/A C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
PID 1412 wrote to memory of 4116 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe
PID 1412 wrote to memory of 4116 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe
PID 1412 wrote to memory of 4116 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe
PID 1412 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe
PID 1412 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe
PID 1412 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe
PID 1412 wrote to memory of 3780 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe
PID 1412 wrote to memory of 3780 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe
PID 1412 wrote to memory of 3780 N/A C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe
PID 3780 wrote to memory of 3164 N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3780 wrote to memory of 3164 N/A C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2432 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2432 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 2688 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 4440 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 4440 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 3144 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 3144 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 3144 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 3144 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 3144 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3164 wrote to memory of 3144 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe

"C:\Users\Admin\AppData\Local\Temp\4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b.exe"

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"

C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe

"C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe"

C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe

"C:\Users\Admin\AppData\Local\Temp\1000030001\4c657176cb.exe"

C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe

"C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe29d63cb8,0x7ffe29d63cc8,0x7ffe29d63cd8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6460 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6448 /prefetch:8

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,1618278830063599338,16629008028035072917,131072 --disable-features=TranslateUI --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6156 /prefetch:2

Network

Country Destination Domain Proto
RU 31.41.244.10:80 31.41.244.10 tcp
RU 31.41.244.11:80 31.41.244.11 tcp
US 8.8.8.8:53 10.244.41.31.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
RU 185.215.113.103:80 185.215.113.103 tcp
RU 185.215.113.103:80 185.215.113.103 tcp
NL 142.250.102.84:443 accounts.google.com tcp
NL 142.250.102.84:443 accounts.google.com udp
GB 216.58.212.206:443 play.google.com tcp
GB 216.58.212.206:443 play.google.com udp
GB 142.250.178.4:443 www.google.com tcp
N/A 224.0.0.251:5353 udp
NL 142.250.102.84:443 accounts.google.com udp

Files

memory/1956-0-0x0000000000860000-0x0000000000D18000-memory.dmp

memory/1956-1-0x0000000077D46000-0x0000000077D48000-memory.dmp

memory/1956-2-0x0000000000861000-0x000000000088F000-memory.dmp

memory/1956-3-0x0000000000860000-0x0000000000D18000-memory.dmp

memory/1956-4-0x0000000000860000-0x0000000000D18000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

MD5 73f3d06a3027d3f7e86b6e44ac5eb905
SHA1 e0608353485f123b49e7a18b880971be24584046
SHA256 4cd700c07d346e16f4d802b9d7a59201fef4b209deef6bcae26bc2b8b6c0ca1b
SHA512 5722e0b54a6e8dd56b2f3f9f2b56d82ed48f867231c9faad4f716000d495bb231184e511cd277f697a49094e92a3e38569c770d3f56d45f7363723a9e3128ad3

memory/1412-17-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/1956-16-0x0000000000860000-0x0000000000D18000-memory.dmp

memory/1412-19-0x0000000000991000-0x00000000009BF000-memory.dmp

memory/1412-20-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/1412-21-0x0000000000990000-0x0000000000E48000-memory.dmp

C:\Users\Admin\AppData\Roaming\1000026000\f5c0d9b66e.exe

MD5 b3a239beeb5dedb7629a68e9ed216d4c
SHA1 f8092284123f59a72267611ef31fb60759eafbdb
SHA256 f539c6ebab703708ab993bacab000fd97274d49364bf0d58a2df6857d7d5d1d7
SHA512 05fcdb1089cf89b6cce19f6535a4e42adf8b2feefb6a273ab082180a3c43cbb55e0ab60a23bc00717e423228144a8825497b62dfecb469d142558148f6455459

memory/4116-37-0x0000000000190000-0x0000000000802000-memory.dmp

memory/4116-47-0x0000000000190000-0x0000000000802000-memory.dmp

memory/4116-46-0x0000000000191000-0x00000000001A5000-memory.dmp

memory/1412-54-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/4624-56-0x0000000000020000-0x0000000000692000-memory.dmp

memory/4116-58-0x0000000000190000-0x0000000000802000-memory.dmp

memory/4624-60-0x0000000000020000-0x0000000000692000-memory.dmp

memory/1412-61-0x0000000000990000-0x0000000000E48000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000040001\9968150715.exe

MD5 c5090cfde317cb004d4ee929fbe966bf
SHA1 62707964fb1e4b3003a208c088a7976cd317d374
SHA256 b736c6b7105621cabf5402e769b37818e51fb96a2308413c959a0a642cd603f2
SHA512 49c2219ccd4058277d298b023ca3592e97e9fb2e4df33a5971b042dc632546158439aa37a1ed6a5096cfb23af45cfdd07b2fb84a411f6464e120d7764bd687a3

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\throttle_store.dat

MD5 9e4e94633b73f4a7680240a0ffd6cd2c
SHA1 e68e02453ce22736169a56fdb59043d33668368f
SHA256 41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512 193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 a9b823889a5ceefc1f05833a76471039
SHA1 4ebbc46196450024f3fc8ef0a9e962dcfc690c9c
SHA256 f6ba838f5a107f2ed57e599251435b8e59aadb985738737345c378f9eaa5437c
SHA512 ee241f3a8f0b06f55a72cfe7e611cf72877ec6cf5405d6600ed31994939a86e8c143379140c0947c6cc24617d86e9e4931636ee9922807c958548bababc86ebd

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 c1369bf4b2f8b40dd3d1529ab95a4a4c
SHA1 cc75c45d7641bf79d1a017964ee9e03a5f1b8436
SHA256 f2d88fe5b5003dbf578b61934d9f147b82436b466e8c8e3e4ed24149b390a108
SHA512 0bf2f2d92d4b1b86b2c1340b73cad73173e8212fe242d3c5a83bb66bc25f5770b1fa7f28d1dbf4dfdf114119091a7288b3a93c2dc9d9ee854e260a38cf71c147

memory/1412-92-0x0000000000990000-0x0000000000E48000-memory.dmp

\??\pipe\LOCAL\crashpad_3164_JMCUBOWODEGRWNHP

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Sync Data\LevelDB\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

MD5 08565c6c3412a40d64094f93fd8e4572
SHA1 6029b9e46a223b2edf8b1ed8f0e87527a4f1694e
SHA256 35234bafcfa109540a3ba55d5b1cb7cf23a5d526cf2f2b03be90ff8cb158058b
SHA512 8d442e7ce17e7e89ab2bc8180da48ad405442c447a05caa4dd9a2a657334950348e0b40aa4b14e31d2ba12ab03cfed547efbca2f124f3ac5bc6d6486eb4942a1

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 d774cc396208445cee1f79d72f506199
SHA1 8d6e2a22123eff6197ddc796767f4a00c693f9f2
SHA256 2f8b370dc4531b9b6ebdf9ee39e36fad01068284322cb486b6512b17c006417d
SHA512 3ab6e70b51f77284ce1d744d16d2b351c13bcc8a5fd06afa7e5cd1aca97c41c78c126219c11d72fb8b4ca3def4351de2f22f711364a011b9dd1be050051d80da

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences~RFe57c91c.TMP

MD5 e95d9dace9bc54a9a5dabcd936cc5c43
SHA1 8cd49e0e46398afd3c04e395e5685879d81b851c
SHA256 039051e3c0a5b994ce7dadace6e5507d8b74ccea1c822470f74569ea782d789c
SHA512 45c43a338fd0b56e2505a9b971d74d28ae3880c74cdb00509c7a0bee454afa5b5ef3d0ada26b25cef9aa9df65bc1d494584cc684b49bf1c11e827632a3029311

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir\temp-index

MD5 87aee601423a19c71d5e288173d21922
SHA1 f591fc2d02f52c67abb3af619201ac6719cf2424
SHA256 039581ab58dddc55530b553049e417e5ee08335450d20fbbfee1788369108063
SHA512 8166e5bac379cd16f5dffda96edcc1a76cd749e10ed96aa6823a342362d3f8cf66c1c737a9f5da3874d206e4a8e82a13c0765ed51c2136cd4b497ea9e7370d71

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\GrShaderCache\GPUCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Microsoft Edge.lnk

MD5 79e50c8058841b4895019e2acedca2d6
SHA1 7b7ec22231a45bec9de7e86f1a9b3921b2f94add
SHA256 c90163539559c4071f92624f628d415eabc79825f58bd1e1aeab40982848a452
SHA512 7a8cfbc6bcd3129726d3376621ca0859cdd4fa19da49c1e535d7415251c4c8fc30251208402fc296265fe24f09302cb50d6e973b0188c931a83ab715cc2b3c40

memory/1412-198-0x0000000000990000-0x0000000000E48000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge (2).lnk

MD5 a689d3fee4d54981d79b14db6ad4af7d
SHA1 0effb4e4235cbba6c3fe9ceabb521eec82ed0891
SHA256 3f325e8f04df95808bb4a8ba5d9b15d5e5643f554725c51a2cb9ac9240eed36f
SHA512 5200e86f996e5138c162d4d5e1c8f5909b4285c837334e8a94ccb0b109c3d6adf18c687a95837fa753817ab79fea8a6b1d862e0622c27a74812babb430c7cf17

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

memory/1412-260-0x0000000000990000-0x0000000000E48000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 a260fcd105de9fe59aa9d9338291398a
SHA1 d01fa3f21ce4ae9916c8f81a9d47abdbcdade80e
SHA256 87a8ef16b72a42ab8e2ef55a4d101b609729605cd304d637462584aeaa4a3909
SHA512 c2bc0978bab2674aa03a08f3c5faad38bd2ec969a708d9d7dc640a5ad5464b0e5643aa7b0e0cb85a04810903bf479b2159cdd438682545997bf744fcdda1e709

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences

MD5 a98d8ccd3379cdb72192f489b4a1add2
SHA1 11ed2b492422a326b0c83751a2d9dc3b2f0bd0dc
SHA256 1421e6d62c216b84c140f87388baacd332b1308cda57723ac53507a6dc03b7e7
SHA512 25c9e5b6d591847b58e1bf458b13b1ed039af2298ee8c234dfd3133c2eb2afebe42eb025ef1549fcfc8af74827530f41fe9ad3083afaabdb203c6ef1719b536f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe57f107.TMP

MD5 ba91b3b646c600fcb62370e0f745eaf0
SHA1 a0c45e0e40de8a5b3df24c16482c3665c554f412
SHA256 7b2541d2d38c640e0cdab4914b786848e57c25b41364674e6d9c8957fa237b76
SHA512 22952a561ca0bfe4b2924467685f6c2a629f77d3c1b699061154b70aea3cd52181177b011704d55be5dd158d269f9da04f4092c4fb28da05e8af9b41e6177390

memory/1412-289-0x0000000000990000-0x0000000000E48000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Code Cache\js\index-dir\the-real-index

MD5 fcce28442a7461ac208b37e86eda33ca
SHA1 8b6001b736bfb8ec1a8fa7f254d762bade296b00
SHA256 b119be686aeeb445a7dcb58931d16a4a323bec631ca45c8119624bd2057542c8
SHA512 c47cd59cd31e37654d88bb0c6cbc1df8e4ca4dfb17525af46ebedb217d0f304cd0d1f89cb99a2eccb44aedc42ecb833e6398cb7e0f92ff4965f7a777ab796b5c

memory/1412-331-0x0000000000990000-0x0000000000E48000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\28aacda1-3d12-44ba-9c66-4d57604afe31.tmp

MD5 63f3e7ccecc50291e6dbce693ff7d0d1
SHA1 63f5e215b8e0444edd8ad18647db62800dc781b7
SHA256 d326e5e42c1f6deda124fdd696d9ce54dca421f6bee9805eb4ffcb349c75d5ec
SHA512 bd679f8173781b3f6265e8c693aa2ae960aaff18e4cc0d1bbcee18b533d06098864d9e35f2c5b71475ae94caf2313596040c97ae309c7c744bd7470f692033f8

memory/1412-350-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/1412-351-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/2216-362-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/1412-363-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/1412-375-0x0000000000990000-0x0000000000E48000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

MD5 1a4afcf1c103fd473c5fc68073b259cb
SHA1 b6b4d30d4e5a4dcd15ab67e582a43d25f7033a00
SHA256 9447f592513075ff710d8e5e35a48759da2b007e2c10e9ad0e341a864912234b
SHA512 3bd8ac6241b7c2a5e9e20ccd65785bdcc04a69ab2773bdcfeff81d694a5f3c7171ba9950bb64ebcb07a87ea871dbbb10dbb2a287fe2d90abe68764834a38cb6b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network Persistent State

MD5 2800881c775077e1c4b6e06bf4676de4
SHA1 2873631068c8b3b9495638c865915be822442c8b
SHA256 226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512 e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network Persistent State

MD5 639f7975da36ae0137c065ee661f0d79
SHA1 4a537eeccb2ecd872a131ad7142c33e1e66b0697
SHA256 3d00f441af0a8ea2a74320815316656aab6c97e8e3341c559ba94601048b8768
SHA512 7e226d3066bd3c90394b6201452c803234fb223b1de18ec1598d16263f2fcfc2875f1f5e123a9241ca729ca40f1246cbda226b9143436beafa75e040f85e1641

memory/1412-403-0x0000000000990000-0x0000000000E48000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\TransportSecurity

MD5 35601ef5e2ca3118c28f0eb10314eff3
SHA1 b26a3e0068c973ba06a94daf64ebb5a1274d8810
SHA256 7b97f0babbfb0f087464c262fdace095ce1da2a62a80bd22cafa150eafcc296f
SHA512 e53a229f08880b34bc244f69251827c909eb5e2adec85f7f380a976b00505669eb35d745e9bc58038dc7cbcb0fee915925b4d9cce3348222f9dc47c921b5cde2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\TransportSecurity~RFe58eb36.TMP

MD5 869f2722b2bebe4a127812be0edf7efd
SHA1 b59e4d812e1b9d01ca88bdbc74ef4f16fd85daf2
SHA256 7a13151c53ddd519a0a7568958c4cc8abf059d35ba9453d9dc78053174503666
SHA512 022f52a30089d90be6a8591dcab4ccb45211af79b492e454c6aa0c626d4b7d0d3716b0f6a238a8cf0f3d973d624669fa14b2111c72109c004c27e951fc42ff34

memory/1412-413-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/1412-414-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/1412-415-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/1412-416-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/2860-418-0x0000000000990000-0x0000000000E48000-memory.dmp

memory/1412-421-0x0000000000990000-0x0000000000E48000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Network Persistent State

MD5 84efb80c74c2e7db7dd33c0c212b1cac
SHA1 f92344ba2b3d86907fc216aafcf368f03310e436
SHA256 13614c4f89af99104cbef6104c8117ac97821d2a5de45ba3f115915179dd47a3
SHA512 9f90ca363150c1a233cd98f496aa7a2088c55893377db32b864454e55a5e22e79f11a5dc0094c18ca391670b60bc72bbbe5fcc8882c98f4154a1ec351f1678c6

memory/1412-433-0x0000000000990000-0x0000000000E48000-memory.dmp