Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 06:09

General

  • Target

    HWID Checker.exe

  • Size

    78KB

  • MD5

    580a5db3ec217979caa1ac20fc504f25

  • SHA1

    bae84ceed3c5962738a326879bf42a0b9d07aa6e

  • SHA256

    5bce7dbec4e5f84a3548b60cfc92db0cb12ad033a6dc1d6f4606af3aa1b55265

  • SHA512

    925f7d68b5275901edc5272eb354b54cda9ce6aea56d72dba65a78b5b9eddfeebb8329434a219eb00b2c1ac885f58975a064c6af04a84b1c28fb59ec448cc219

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+VPIC:5Zv5PDwbjNrmAE+FIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxNTgyOTU4NTc4NjQzNzY0NA.GYfgs3.ld1fBGDCSajdNinuOIM7RFm1X5IhX4xNi-p49c

  • server_id

    1315830690436349982

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 19 IoCs
  • Drops file in System32 directory 16 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 21 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 51 IoCs
  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:392
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{99098c81-cd91-482a-9161-664650723a92}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3936
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:668
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
      1⤵
        PID:952
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
        1⤵
          PID:516
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
          1⤵
            PID:860
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:1056
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:1080
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                1⤵
                • Drops file in System32 directory
                PID:1180
                • C:\Windows\system32\taskhostw.exe
                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                  2⤵
                    PID:3044
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                  • Indicator Removal: Clear Windows Event Logs
                  PID:1204
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                  1⤵
                    PID:1244
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                    1⤵
                      PID:1332
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                      1⤵
                        PID:1340
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                        1⤵
                          PID:1380
                          • C:\Windows\system32\sihost.exe
                            sihost.exe
                            2⤵
                            • Modifies registry class
                            PID:2832
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                          1⤵
                            PID:1452
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                            1⤵
                              PID:1524
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                              1⤵
                                PID:1532
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                1⤵
                                  PID:1664
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                  1⤵
                                    PID:1700
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                    1⤵
                                      PID:1756
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                      1⤵
                                        PID:1804
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        PID:1812
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x3d4 0x3c4
                                          2⤵
                                            PID:1088
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                          1⤵
                                            PID:1904
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1912
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                              1⤵
                                                PID:1980
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                1⤵
                                                  PID:2008
                                                • C:\Windows\System32\spoolsv.exe
                                                  C:\Windows\System32\spoolsv.exe
                                                  1⤵
                                                    PID:1424
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                    1⤵
                                                      PID:2088
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                      1⤵
                                                        PID:2264
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                        1⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2292
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                        1⤵
                                                          PID:2344
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                          1⤵
                                                            PID:2352
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                            1⤵
                                                            • Drops file in System32 directory
                                                            PID:2396
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2492
                                                          • C:\Windows\sysmon.exe
                                                            C:\Windows\sysmon.exe
                                                            1⤵
                                                              PID:2524
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                              1⤵
                                                                PID:2628
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                1⤵
                                                                  PID:2644
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                  1⤵
                                                                    PID:2848
                                                                  • C:\Windows\system32\wbem\unsecapp.exe
                                                                    C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                    1⤵
                                                                      PID:2120
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                      1⤵
                                                                        PID:2536
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                        1⤵
                                                                          PID:3380
                                                                        • C:\Windows\Explorer.EXE
                                                                          C:\Windows\Explorer.EXE
                                                                          1⤵
                                                                          • Modifies registry class
                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:3488
                                                                          • C:\Users\Admin\AppData\Local\Temp\HWID Checker.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\HWID Checker.exe"
                                                                            2⤵
                                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                            • Suspicious use of SetThreadContext
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:4320
                                                                            • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                              "SCHTASKS.exe" /create /tn "$77HWID Checker.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\HWID Checker.exe'" /sc onlogon /rl HIGHEST
                                                                              3⤵
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:4132
                                                                              • C:\Windows\System32\Conhost.exe
                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                4⤵
                                                                                  PID:2220
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/
                                                                                3⤵
                                                                                • Enumerates system info in registry
                                                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:3184
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb236a46f8,0x7ffb236a4708,0x7ffb236a4718
                                                                                  4⤵
                                                                                    PID:2956
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
                                                                                    4⤵
                                                                                      PID:2480
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
                                                                                      4⤵
                                                                                        PID:3748
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:8
                                                                                        4⤵
                                                                                          PID:1372
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                                                                                          4⤵
                                                                                            PID:4280
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                                                                                            4⤵
                                                                                              PID:1068
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:1
                                                                                              4⤵
                                                                                                PID:4328
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:1
                                                                                                4⤵
                                                                                                  PID:3412
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5136 /prefetch:8
                                                                                                  4⤵
                                                                                                    PID:1164
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5304 /prefetch:8
                                                                                                    4⤵
                                                                                                      PID:3692
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:8
                                                                                                      4⤵
                                                                                                        PID:3684
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:8
                                                                                                        4⤵
                                                                                                          PID:1188
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                                                                                                          4⤵
                                                                                                            PID:4596
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:1
                                                                                                            4⤵
                                                                                                              PID:948
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
                                                                                                              4⤵
                                                                                                                PID:3548
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9105050755415837766,9948367781040983152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:1
                                                                                                                4⤵
                                                                                                                  PID:3412
                                                                                                            • C:\Windows\system32\taskmgr.exe
                                                                                                              "C:\Windows\system32\taskmgr.exe" /4
                                                                                                              2⤵
                                                                                                              • Checks SCSI registry key(s)
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                              PID:5064
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                            1⤵
                                                                                                              PID:3604
                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                              1⤵
                                                                                                                PID:3800
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3956
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:3556
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                  1⤵
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:5036
                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                  1⤵
                                                                                                                    PID:4008
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                    1⤵
                                                                                                                      PID:3712
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                      1⤵
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:2684
                                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                      1⤵
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                      PID:2540
                                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                      1⤵
                                                                                                                        PID:8
                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                        1⤵
                                                                                                                          PID:1736
                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                          1⤵
                                                                                                                            PID:4168
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                            1⤵
                                                                                                                              PID:4552
                                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                              1⤵
                                                                                                                                PID:4556
                                                                                                                              • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                C:\Windows\System32\WaaSMedicAgent.exe 04737f1d17fe294ebc873dce3918d8d6 tS5/P0Mzg0qS33Si/bNfoA.0.1.0.0.0
                                                                                                                                1⤵
                                                                                                                                  PID:4528
                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    2⤵
                                                                                                                                      PID:2260
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                    1⤵
                                                                                                                                      PID:1356
                                                                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                      1⤵
                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                                      • Enumerates system info in registry
                                                                                                                                      PID:2944
                                                                                                                                    • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                      C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                      1⤵
                                                                                                                                        PID:3664
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                        1⤵
                                                                                                                                          PID:2128
                                                                                                                                        • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                          C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                          1⤵
                                                                                                                                          • Checks processor information in registry
                                                                                                                                          • Enumerates system info in registry
                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:1560
                                                                                                                                        • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                          C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                          1⤵
                                                                                                                                          • Drops file in Windows directory
                                                                                                                                          PID:4856
                                                                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                          1⤵
                                                                                                                                            PID:3064
                                                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                            1⤵
                                                                                                                                              PID:2144
                                                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                              1⤵
                                                                                                                                                PID:4388
                                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                1⤵
                                                                                                                                                  PID:1284
                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2308
                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                                                    1⤵
                                                                                                                                                      PID:992

                                                                                                                                                    Network

                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                    Replay Monitor

                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                    Downloads

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                      Filesize

                                                                                                                                                      152B

                                                                                                                                                      MD5

                                                                                                                                                      36988ca14952e1848e81a959880ea217

                                                                                                                                                      SHA1

                                                                                                                                                      a0482ef725657760502c2d1a5abe0bb37aebaadb

                                                                                                                                                      SHA256

                                                                                                                                                      d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6

                                                                                                                                                      SHA512

                                                                                                                                                      d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                      Filesize

                                                                                                                                                      152B

                                                                                                                                                      MD5

                                                                                                                                                      fab8d8d865e33fe195732aa7dcb91c30

                                                                                                                                                      SHA1

                                                                                                                                                      2637e832f38acc70af3e511f5eba80fbd7461f2c

                                                                                                                                                      SHA256

                                                                                                                                                      1b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea

                                                                                                                                                      SHA512

                                                                                                                                                      39a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                      Filesize

                                                                                                                                                      456B

                                                                                                                                                      MD5

                                                                                                                                                      7f1f81b734c2a79ecf2164b9712a624a

                                                                                                                                                      SHA1

                                                                                                                                                      9229c474c1b402c90e719b4b0459a38325d3fe9c

                                                                                                                                                      SHA256

                                                                                                                                                      f8dd6f232ea4fd427b67ebf14eb5687b8bc04078af544ddbbd13e37bbcd68f23

                                                                                                                                                      SHA512

                                                                                                                                                      0b88daf7cf0bfbd5b922f90ad680256a9d60cd0fda5c1e886abf7c2bb48a7ed393f032f7c3d307a30c6774fc13f816061c086da2904840d65855f5d8ecf6eda3

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                      Filesize

                                                                                                                                                      2KB

                                                                                                                                                      MD5

                                                                                                                                                      76253720531a33d5a3a2f7a50383142c

                                                                                                                                                      SHA1

                                                                                                                                                      ae1ced56c0e6928b310fe205952e47b5216867ad

                                                                                                                                                      SHA256

                                                                                                                                                      8e3a6b428e5eb1c9a54a03647464cdc75377ba707380b768f4f448bfcf94d2c1

                                                                                                                                                      SHA512

                                                                                                                                                      35f4ae0e30f970d3fe5a274a15394e461e2262ffebf75bcdb90a0351beb85f3a54fae59da8210b4fe0b200240c5c22e7611dec5a28c8b7353621c66ad1c4e48f

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                      Filesize

                                                                                                                                                      5KB

                                                                                                                                                      MD5

                                                                                                                                                      f4b0fec2daefface48d19a2349d1bb7f

                                                                                                                                                      SHA1

                                                                                                                                                      9f53ba952acae8edc41bc321775be76bc0ad5cf4

                                                                                                                                                      SHA256

                                                                                                                                                      27cf0e10b797f34a37af6c5b7e96240949aeafefee536f602e77e2880ef7f282

                                                                                                                                                      SHA512

                                                                                                                                                      db6370cf35487fcbc7829ae83b55b33fe5241b6a0189c37bbbe41ec363fac7bdc4bb7865e96e9955bad85042427b2fee93315e764c280846bfe7ba978a8611c3

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                      Filesize

                                                                                                                                                      6KB

                                                                                                                                                      MD5

                                                                                                                                                      bc287c205966ac7499e7c8bd3f6cebb2

                                                                                                                                                      SHA1

                                                                                                                                                      4a6d61a981993434a03cfef274b5b6eab09f2a98

                                                                                                                                                      SHA256

                                                                                                                                                      9c80dff06e65c7f714c60fcbcfe0d5b262ada39d682eebab67e09213c49265e1

                                                                                                                                                      SHA512

                                                                                                                                                      1e25ceb6d703cde810be6daab5391b0fa067feb642f116ffaac15db003d797a516e4ccef64002bb8a5c1f1c178f21aa52c2d1544096d4fcb9db947ff6c80122c

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                      Filesize

                                                                                                                                                      6KB

                                                                                                                                                      MD5

                                                                                                                                                      97b937f748463e18b49cd47207a8837c

                                                                                                                                                      SHA1

                                                                                                                                                      0cdae4e27b9578c9aaac6e8c2b094436e3da7b23

                                                                                                                                                      SHA256

                                                                                                                                                      06f03e2362b25c0a5fa8d50a6e43ed7f237adf7fb452cea467335fced6f3bed1

                                                                                                                                                      SHA512

                                                                                                                                                      f4e986483733f9e0dd48d95938e53f989d584bc270d8554480c1fc6b55e9c93bb751730414a36d3511f36616ac9d86c5ed97279ffae2b763e7a533f10740b69c

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\03f7c572-3233-4dda-a797-768a85a8a4d3\index-dir\the-real-index

                                                                                                                                                      Filesize

                                                                                                                                                      2KB

                                                                                                                                                      MD5

                                                                                                                                                      24b54476505ad2ba826b74b409495268

                                                                                                                                                      SHA1

                                                                                                                                                      c307cc4e4af99c0c0cc7cbdb6daa256a4f90bf00

                                                                                                                                                      SHA256

                                                                                                                                                      264c8cdb9b72e5f8b2e2097ebcecd3db107ce03afe85c2439bb1eda6ca905930

                                                                                                                                                      SHA512

                                                                                                                                                      00e2bdfd45a53412871e9ee40663d27c5e5f093a69c1d85fbef72697f9014228df85b48cab81b4a987f9770227e97a4fb083980ca09a11841477df09f4698c0b

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\03f7c572-3233-4dda-a797-768a85a8a4d3\index-dir\the-real-index~RFe595058.TMP

                                                                                                                                                      Filesize

                                                                                                                                                      48B

                                                                                                                                                      MD5

                                                                                                                                                      f6490ed2bb38b1bc4282dd64b45e7537

                                                                                                                                                      SHA1

                                                                                                                                                      8d18b6e45e25978afe55a5e1b65b0cd52500bbca

                                                                                                                                                      SHA256

                                                                                                                                                      12140640f39b2e913549c3f1ce77b9551fba7e0943a02d828c9554cc3b809fec

                                                                                                                                                      SHA512

                                                                                                                                                      b718757ef2d17ca43a9cf9b1a9f53581410f1f9f730c97ab4167919096e67ed6ee1f4110fb2ffff7d2cd05a9779305ae1611b887ed93ba5091a2db962b6a31df

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                      Filesize

                                                                                                                                                      146B

                                                                                                                                                      MD5

                                                                                                                                                      5d4469b5cd0d737fd74396ba28e876ae

                                                                                                                                                      SHA1

                                                                                                                                                      49a4041cc2ac6ec8cb715f9f63275a75eafb2240

                                                                                                                                                      SHA256

                                                                                                                                                      90945f331d6b42e01f5d95add3a84d8b7552324afc9dd83ff019c620dd0ade44

                                                                                                                                                      SHA512

                                                                                                                                                      22d1d1ca8a0e27e136dc17c0b74f2a08acedd4e79ad547b346feb78ccc6e7f8744c54c5cbdcd3d857f6fda565f626e34a4218c8ad80c21826f2dd97e37b6a71a

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                      Filesize

                                                                                                                                                      82B

                                                                                                                                                      MD5

                                                                                                                                                      6702d78498583c26210ea2c02b3d6421

                                                                                                                                                      SHA1

                                                                                                                                                      4548a640ff999abc9de7ee3636fabf1e60f75781

                                                                                                                                                      SHA256

                                                                                                                                                      897bef83e466e4cd1b22a2baace6fc0a417ce0ccdc07be3a8f59232f6949c3f2

                                                                                                                                                      SHA512

                                                                                                                                                      7072d4d8663a06d56a47ce78138b886243843332832fec4e0745705b545b266cabde594ae012ad6fc630baccb5e4b858bb4abe0f2a1202833423be6f494f5e6f

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                      Filesize

                                                                                                                                                      89B

                                                                                                                                                      MD5

                                                                                                                                                      0f840a1314282c61560884930791487a

                                                                                                                                                      SHA1

                                                                                                                                                      1284f8fec2089ef595cac6664976700d95259a7c

                                                                                                                                                      SHA256

                                                                                                                                                      457172231951ea4adda02dc1bd0be898552176c58cebc7e5b9d917344e8d345d

                                                                                                                                                      SHA512

                                                                                                                                                      a121adad3312a8f6983653d0424aa7bb89df22f300682d8d5fa42ff87a1387de9bcf439fbcc7473ec65ceecefb0ed2ddae7e336f532d9c0339014bf3beee2790

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                                                                                                      Filesize

                                                                                                                                                      84B

                                                                                                                                                      MD5

                                                                                                                                                      3ee68e55eda6172953187d5f19e1288a

                                                                                                                                                      SHA1

                                                                                                                                                      64b82792949ac92f32e5f11e74fa214025e3408d

                                                                                                                                                      SHA256

                                                                                                                                                      3039c7fb83896a2a49ffc30e2c196d5a14895843d6822cfca53e28a5d7e96e78

                                                                                                                                                      SHA512

                                                                                                                                                      2e690f064abce47dd257a2fe10c5da0fe7dde4d28217973ab963adc72b8bdbd7683e2c103e76b9bfc4297bd05cbf3cda5e8b1efe35fdcffe5adce585a9f1e25c

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT

                                                                                                                                                      Filesize

                                                                                                                                                      16B

                                                                                                                                                      MD5

                                                                                                                                                      46295cac801e5d4857d09837238a6394

                                                                                                                                                      SHA1

                                                                                                                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                      SHA256

                                                                                                                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                      SHA512

                                                                                                                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                      Filesize

                                                                                                                                                      72B

                                                                                                                                                      MD5

                                                                                                                                                      e0897240e34623c66d9b53744f578bae

                                                                                                                                                      SHA1

                                                                                                                                                      7b337cbe98794d4886cbeadec7939cc86e5e6d87

                                                                                                                                                      SHA256

                                                                                                                                                      cbef6de536bd788886493c26427ffa3ab86a2ec9b4cd848a7d7b2d624a452f79

                                                                                                                                                      SHA512

                                                                                                                                                      6b18251bf28f38f55ba261288a22631ceeabb57d646f9565bbd8e63fa172759012cfdacef2d869fa256e5a97ef7425d96d0231856809e372f19ae421bc3dca19

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                      Filesize

                                                                                                                                                      48B

                                                                                                                                                      MD5

                                                                                                                                                      2e6e399631ae7a8b36c51fb28a86f305

                                                                                                                                                      SHA1

                                                                                                                                                      e962da7fbbb178b165670d2b9c63edda6cf614c0

                                                                                                                                                      SHA256

                                                                                                                                                      cf74cbac43aa21e74911966226bd7a04314286e10fa800fe6e63404d690da117

                                                                                                                                                      SHA512

                                                                                                                                                      f6b1b6b2614271a0256c388e49c2ef060b6a79e0ced6da348c44cd06c655628da491c104288171e4b4b320df2b6d500a1089656a9fe29eec36b1318181c488ec

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe594b76.TMP

                                                                                                                                                      Filesize

                                                                                                                                                      48B

                                                                                                                                                      MD5

                                                                                                                                                      5baa3c83309e5de9ace745d66965435b

                                                                                                                                                      SHA1

                                                                                                                                                      51e0c37477ee714f1109a203db86aa80a5a41cc9

                                                                                                                                                      SHA256

                                                                                                                                                      43fe0d53db377c200ee7b9e2ef96f6fd9c77f8dda26340283672c53726e0c834

                                                                                                                                                      SHA512

                                                                                                                                                      99f49691d5342746493103ea3f207a3a3de37f9eef3d20b43b88d5be9905f80b02ee30a09248039286b53f1395f0b271199c0c1201004cdf59b1973cafa40113

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                      Filesize

                                                                                                                                                      16B

                                                                                                                                                      MD5

                                                                                                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                      SHA1

                                                                                                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                      SHA256

                                                                                                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                      SHA512

                                                                                                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                      Filesize

                                                                                                                                                      10KB

                                                                                                                                                      MD5

                                                                                                                                                      e84f1b2897436d62c9e2f75e60cfea1f

                                                                                                                                                      SHA1

                                                                                                                                                      5abff3898764f8a772b66774cc86eec4f7fe985d

                                                                                                                                                      SHA256

                                                                                                                                                      33e534215e4e99465b9e70e27ed548a95298e333d7d6953662d7ff680ae02d66

                                                                                                                                                      SHA512

                                                                                                                                                      f247f7a77e2a6238bec99f5fc447e8f016d79f623bdc3b0fe9cde7a833e2282c67c0b3e7c0ad917c2aa53fe58ff1f2952141824abde2b1cfed0118fda9fa38e3

                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                      Filesize

                                                                                                                                                      10KB

                                                                                                                                                      MD5

                                                                                                                                                      7d5f33da13255e6bb0f551e59c2139d7

                                                                                                                                                      SHA1

                                                                                                                                                      089b5d9e12b9f02c4785a4e7800f91dbd16ceea9

                                                                                                                                                      SHA256

                                                                                                                                                      9621e93420ae4d67c73fc0efa721d4418d89f4e2e4160ffa1b2ad78e98102da6

                                                                                                                                                      SHA512

                                                                                                                                                      aee9e4f05a0dbca50165167fa7841f599373fb52bcaf7aa104266d9586d0aef1bbc4953ca5bfa4f2f3d4b20d55e2220f8c39cab7bc3e4d05feba8a8b33714f5f

                                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                                      Filesize

                                                                                                                                                      2KB

                                                                                                                                                      MD5

                                                                                                                                                      8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                                                                      SHA1

                                                                                                                                                      98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                                                                      SHA256

                                                                                                                                                      ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                                                                      SHA512

                                                                                                                                                      c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                                      Filesize

                                                                                                                                                      2KB

                                                                                                                                                      MD5

                                                                                                                                                      f313c5b4f95605026428425586317353

                                                                                                                                                      SHA1

                                                                                                                                                      06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                                                      SHA256

                                                                                                                                                      129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                                                      SHA512

                                                                                                                                                      b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                      Filesize

                                                                                                                                                      2KB

                                                                                                                                                      MD5

                                                                                                                                                      ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                                      SHA1

                                                                                                                                                      a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                                      SHA256

                                                                                                                                                      98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                                      SHA512

                                                                                                                                                      1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                      Filesize

                                                                                                                                                      2KB

                                                                                                                                                      MD5

                                                                                                                                                      7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                                      SHA1

                                                                                                                                                      63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                                      SHA256

                                                                                                                                                      727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                                      SHA512

                                                                                                                                                      f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                      Filesize

                                                                                                                                                      2KB

                                                                                                                                                      MD5

                                                                                                                                                      1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                                      SHA1

                                                                                                                                                      5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                                      SHA256

                                                                                                                                                      55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                                      SHA512

                                                                                                                                                      5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                                    • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                      Filesize

                                                                                                                                                      2KB

                                                                                                                                                      MD5

                                                                                                                                                      0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                                      SHA1

                                                                                                                                                      9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                                      SHA256

                                                                                                                                                      a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                                      SHA512

                                                                                                                                                      c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                                    • memory/392-28-0x00000193FC9C0000-0x00000193FC9EA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/392-29-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/392-35-0x00000193FC9C0000-0x00000193FC9EA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/516-40-0x00007FFB4648C000-0x00007FFB4648D000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      4KB

                                                                                                                                                    • memory/516-295-0x00000220B3140000-0x00000220B316A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/516-39-0x00000220B3140000-0x00000220B316A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/516-37-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/516-36-0x00000220B3140000-0x00000220B316A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/616-33-0x00007FFB4648D000-0x00007FFB4648E000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      4KB

                                                                                                                                                    • memory/616-18-0x0000023270320000-0x0000023270343000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      140KB

                                                                                                                                                    • memory/616-19-0x0000023270350000-0x000002327037A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/616-20-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/616-32-0x0000023270350000-0x000002327037A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/668-24-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/668-34-0x000002004B7B0000-0x000002004B7DA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/668-23-0x000002004B7B0000-0x000002004B7DA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/860-46-0x000002B6D9AA0000-0x000002B6D9ACA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/860-47-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/860-49-0x000002B6D9AA0000-0x000002B6D9ACA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/860-297-0x000002B6D9AA0000-0x000002B6D9ACA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/952-41-0x000001EDDDED0000-0x000001EDDDEFA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/952-42-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/952-44-0x000001EDDDED0000-0x000001EDDDEFA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/952-296-0x000001EDDDED0000-0x000001EDDDEFA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/1056-66-0x0000016E6CF00000-0x0000016E6CF2A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/1056-54-0x0000016E6CF00000-0x0000016E6CF2A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/1056-55-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/1056-299-0x0000016E6CF00000-0x0000016E6CF2A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/1080-57-0x0000024124140000-0x000002412416A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/1080-58-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/1180-61-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/1180-60-0x00000247AD3C0000-0x00000247AD3EA000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/1204-64-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/1204-63-0x0000013771B40000-0x0000013771B6A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/1244-68-0x000001B7F6740000-0x000001B7F676A000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      168KB

                                                                                                                                                    • memory/1244-69-0x00007FFB06470000-0x00007FFB06480000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      64KB

                                                                                                                                                    • memory/3936-11-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      256KB

                                                                                                                                                    • memory/3936-9-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      256KB

                                                                                                                                                    • memory/3936-13-0x00007FFB451C0000-0x00007FFB4527E000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      760KB

                                                                                                                                                    • memory/3936-10-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      256KB

                                                                                                                                                    • memory/3936-12-0x00007FFB463F0000-0x00007FFB465E5000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      2.0MB

                                                                                                                                                    • memory/3936-15-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      256KB

                                                                                                                                                    • memory/4320-420-0x000001821D810000-0x000001821D822000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      72KB

                                                                                                                                                    • memory/4320-14-0x00007FFB28110000-0x00007FFB28BD1000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      10.8MB

                                                                                                                                                    • memory/4320-0-0x00007FFB28113000-0x00007FFB28115000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      8KB

                                                                                                                                                    • memory/4320-421-0x000001821D860000-0x000001821D87E000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      120KB

                                                                                                                                                    • memory/4320-419-0x000001821EB10000-0x000001821EB86000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      472KB

                                                                                                                                                    • memory/4320-8-0x00007FFB451C0000-0x00007FFB4527E000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      760KB

                                                                                                                                                    • memory/4320-7-0x00007FFB463F0000-0x00007FFB465E5000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      2.0MB

                                                                                                                                                    • memory/4320-6-0x000001821D040000-0x000001821D07E000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      248KB

                                                                                                                                                    • memory/4320-5-0x00007FFB28113000-0x00007FFB28115000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      8KB

                                                                                                                                                    • memory/4320-4-0x000001821D8B0000-0x000001821DDD8000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      5.2MB

                                                                                                                                                    • memory/4320-3-0x00007FFB28110000-0x00007FFB28BD1000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      10.8MB

                                                                                                                                                    • memory/4320-2-0x000001821D0B0000-0x000001821D272000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      1.8MB

                                                                                                                                                    • memory/4320-1-0x0000018202AD0000-0x0000018202AE8000-memory.dmp

                                                                                                                                                      Filesize

                                                                                                                                                      96KB