Analysis

  • max time kernel
    135s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2025, 19:43

General

  • Target

    generated30.exe

  • Size

    938KB

  • MD5

    2517b502d7714a4e384044a0b6c2a157

  • SHA1

    aa974d57b3b42a1a72afbe2520ae7333e35d7531

  • SHA256

    66fc943f11f465b81234c1fd1a9dfecb87082fe2560a0b1865c2679a927c76c0

  • SHA512

    f3a87225fecced58e540bab65087e45f7340307b77673e566e7074354cf3f4668815ce56bf5f04fc6dba847a0330fc89cc7c8a4ca48d2b725e39a564f4ae46aa

  • SSDEEP

    24576:q7DB0lkqjVnlqud+/2P+A0+lyv0PTVbUkIaMUcfL8lNsO:q7F0lkqXfd+/9AHly8Pv6Ucz8

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/sendMessage?chat_id=6565043849

https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/sendDocument?chat_id=6565043849&caption=%F0%9F%A5%A0Cookies%20from%20these%20websites%20%5Bgmail.com%20youtube.com%20%5D%20were%20successfully%20grabbed%20from%20the%20Default%20profile%20of%20Microsoft%20Edg

https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/getUpdates?offset=-

Signatures

  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Uses browser remote debugging 2 TTPs 17 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\generated30.exe
    "C:\Users\Admin\AppData\Local\Temp\generated30.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp683F.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp683F.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:3436
        • C:\Windows\system32\tasklist.exe
          Tasklist /fi "PID eq 2856"
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4924
        • C:\Windows\system32\find.exe
          find ":"
          3⤵
            PID:4832
          • C:\Windows\system32\timeout.exe
            Timeout /T 1 /Nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:4800
          • C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe
            "C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4820
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdater /t REG_SZ /d C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe /f
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4676
              • C:\Windows\system32\reg.exe
                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdater /t REG_SZ /d C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe /f
                5⤵
                • Adds Run key to start application
                • Modifies registry key
                PID:5548
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default" --headless --no-sandbox --disable-gpu
              4⤵
              • Uses browser remote debugging
              • Checks processor information in registry
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:5552
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ff995c1dcf8,0x7ff995c1dd04,0x7ff995c1dd10
                5⤵
                  PID:5644
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2056,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2040 /prefetch:2
                  5⤵
                    PID:5956
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2084,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2080 /prefetch:3
                    5⤵
                      PID:1396
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2360,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2356 /prefetch:8
                      5⤵
                        PID:2440
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2964,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2960 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:4128
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3004,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2996 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:1088
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3736,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3712 /prefetch:2
                        5⤵
                        • Uses browser remote debugging
                        PID:5164
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4104,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4100 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:2472
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4620,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4616 /prefetch:8
                        5⤵
                          PID:6112
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4724,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4584 /prefetch:8
                          5⤵
                            PID:3368
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4944,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4808 /prefetch:8
                            5⤵
                              PID:2692
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4628,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4636 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:4448
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4992,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4632 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:3164
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5060,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5056 /prefetch:1
                              5⤵
                              • Uses browser remote debugging
                              PID:2968
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-sandbox --message-loop-type-ui --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5264,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5108 /prefetch:8
                              5⤵
                                PID:3420
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-sandbox --message-loop-type-ui --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4680,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5064 /prefetch:8
                                5⤵
                                  PID:868
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-sandbox --message-loop-type-ui --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5196,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5192 /prefetch:8
                                  5⤵
                                    PID:4652
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default" --headless --no-sandbox --disable-gpu
                                  4⤵
                                  • Uses browser remote debugging
                                  • Drops file in Program Files directory
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Modifies data under HKEY_USERS
                                  • Modifies registry class
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of WriteProcessMemory
                                  PID:632
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x268,0x7ff97ffdf208,0x7ff97ffdf214,0x7ff97ffdf220
                                    5⤵
                                      PID:2492
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2192,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:2
                                      5⤵
                                        PID:4000
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2204,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2196 /prefetch:3
                                        5⤵
                                          PID:5948
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2360,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2352 /prefetch:8
                                          5⤵
                                            PID:4440
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3348,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3356 /prefetch:1
                                            5⤵
                                            • Uses browser remote debugging
                                            PID:2896
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3372,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3364 /prefetch:1
                                            5⤵
                                            • Uses browser remote debugging
                                            PID:2932
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4592,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4576 /prefetch:1
                                            5⤵
                                            • Uses browser remote debugging
                                            PID:4508
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4708,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4704 /prefetch:1
                                            5⤵
                                            • Uses browser remote debugging
                                            PID:5624
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4896,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4892 /prefetch:8
                                            5⤵
                                              PID:5592
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --no-sandbox --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4816,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4900 /prefetch:8
                                              5⤵
                                                PID:4764
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5008,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:2708
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5028,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5044 /prefetch:8
                                                5⤵
                                                  PID:4928
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=5752,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5748 /prefetch:1
                                                  5⤵
                                                  • Uses browser remote debugging
                                                  PID:5620
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5804,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:8
                                                  5⤵
                                                    PID:2488
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5804,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:8
                                                    5⤵
                                                      PID:1580
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5988,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5956 /prefetch:8
                                                      5⤵
                                                        PID:5864
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=6040,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:8
                                                        5⤵
                                                        • Modifies registry class
                                                        PID:5680
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6216,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=6212 /prefetch:1
                                                        5⤵
                                                        • Uses browser remote debugging
                                                        PID:3920
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5236,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4676 /prefetch:8
                                                        5⤵
                                                          PID:544
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4664,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4676 /prefetch:8
                                                          5⤵
                                                            PID:1796
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=6296,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:1
                                                            5⤵
                                                            • Uses browser remote debugging
                                                            PID:1908
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4736,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4700 /prefetch:8
                                                            5⤵
                                                              PID:6084
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe
                                                      1⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:4532
                                                      • C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe
                                                        C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5844
                                                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                      1⤵
                                                        PID:5332
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                        1⤵
                                                          PID:5392
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                          1⤵
                                                            PID:3156

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe

                                                            Filesize

                                                            938KB

                                                            MD5

                                                            2517b502d7714a4e384044a0b6c2a157

                                                            SHA1

                                                            aa974d57b3b42a1a72afbe2520ae7333e35d7531

                                                            SHA256

                                                            66fc943f11f465b81234c1fd1a9dfecb87082fe2560a0b1865c2679a927c76c0

                                                            SHA512

                                                            f3a87225fecced58e540bab65087e45f7340307b77673e566e7074354cf3f4668815ce56bf5f04fc6dba847a0330fc89cc7c8a4ca48d2b725e39a564f4ae46aa

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                            Filesize

                                                            649B

                                                            MD5

                                                            6540b36957e35de8c2e69a3da3505c44

                                                            SHA1

                                                            fef6966be90be8829d203526372d285ce7b243de

                                                            SHA256

                                                            efd8fd2b5390f85942107c0d2fbf76250450861891865ce9dc6a4654df7321b9

                                                            SHA512

                                                            50b15739812a264576819205c8fd316a1cc4c0b466eb089508e807a94ed6325a2c6e1a05a45cf2cd2e284b0d18eb979480d4ed6c423f9dd18f4ea4a38fd25cd2

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                            Filesize

                                                            2B

                                                            MD5

                                                            d751713988987e9331980363e24189ce

                                                            SHA1

                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                            SHA256

                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                            SHA512

                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            80bb220c47df7852d42545af8a27b982

                                                            SHA1

                                                            6286dc16c97098b9663889a3875141e567075345

                                                            SHA256

                                                            5c2a68aa3052f3e41373024baa1bf5e15b2f9792e68a48e5f09535629c831d1d

                                                            SHA512

                                                            e448e74313a578ad0ae450e25db2f4578e1323e4ac39d90e0c8bb45436dc208c5f38650e57bf034d8fba17aeeacf54ed7afeb05534e077f4a074845ac082b912

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            9cf5c62344b083867152098c4c21a561

                                                            SHA1

                                                            c336e8a69759c6b6340cd14660fb3b3b93b2e6c0

                                                            SHA256

                                                            29326052b098212fdd590f72d727961512e8dc2ad184c3e59d362113e9cc1c8d

                                                            SHA512

                                                            42deee766450178b397d70e60606db5583a2a58ad52274f68509fc494405fa309af4e0652b185c3003cecdd69d2dc32afce4a19cd14a2443fd6d8195bbdc7c91

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                            Filesize

                                                            15KB

                                                            MD5

                                                            ca28f5a2df6d510375417ec92eb6c7c0

                                                            SHA1

                                                            96577da47423e958a198a6c76a6550591049c13a

                                                            SHA256

                                                            0f327800ac4c8d4afbdc4fc13ff2a2556c02317d7311c5acba7bcb009401b5c7

                                                            SHA512

                                                            0c1e4c4389c51ef88d07581d78f3cde80f4ba88149a4f5cd7e9fd7677e15a9e1b9c7140a009f92bde9eac077636d6fcd2cb46002e8d4f547797302fadcef8981

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                            Filesize

                                                            72B

                                                            MD5

                                                            5334e16353068c78a5b42cd97f41d1b4

                                                            SHA1

                                                            5421b9643cd6f65ad1cf67f047a0f4fedad8c32c

                                                            SHA256

                                                            331e287ba0a4bccdfbda1ffac975edb20f228ccf4ca880c94711a4cb234ff599

                                                            SHA512

                                                            ec954d0b6044f0e95de96609197f2bc878adc438ead9c255dd1d93cdd1201477d4f62c6b27cc8c57544c29331b80543c9c5a45491df275dffbd7a5fa7615ef79

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d84f.TMP

                                                            Filesize

                                                            48B

                                                            MD5

                                                            7e2b6ab4f923b154b8657a3eb38fc174

                                                            SHA1

                                                            88c0efe9572c789934f98d98d435a5a31eba5247

                                                            SHA256

                                                            610e9832290e159598e041f9c13c8c87a11de943a51776de02e2706e8d48cd91

                                                            SHA512

                                                            1ed3b12e71c0cee602ed420db6763039fcb2561d413f5e5797eeffecd8cee92feac47929ff4c64079aba8c3b15a38bb0e60aee172475ed0aa137ffc2ee52dc96

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                            Filesize

                                                            153KB

                                                            MD5

                                                            94854d2f934d10fbbac8b972e8662574

                                                            SHA1

                                                            3fe1df2868c56ad54ab6cd5a0be67fc62f72828d

                                                            SHA256

                                                            5b936b5dd1f2625d7ae6f76dc9a6069acb5191b84b882dd6d94f06b33bd92dce

                                                            SHA512

                                                            62c525eb9c65f3f23bab0712209e853551f5c1f1b2785553a292a3534b49c4612fef7d8fa10e03c154338cd9d975db7753dee61a1516ca6c3ff014b62a81be8f

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                            Filesize

                                                            80KB

                                                            MD5

                                                            d8bfe7f445e22f1521d1f54647e13dc3

                                                            SHA1

                                                            6521da545f1417fbe10a48472d1bdcd145a13f25

                                                            SHA256

                                                            e843ce1105aba1bfafb61e125c40732f840d11e485fc94dac221e3a358b990e1

                                                            SHA512

                                                            a126acc132b03969ee4861222dad094480c26ef9d1d17435324f2e7c39e9e1771f9277700cef327ae859e491e958b68a6051a8eea14be88d2074e2e373324288

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            280B

                                                            MD5

                                                            01cc3a42395638ce669dd0d7aba1f929

                                                            SHA1

                                                            89aa0871fa8e25b55823dd0db9a028ef46dfbdd8

                                                            SHA256

                                                            d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee

                                                            SHA512

                                                            d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                            Filesize

                                                            2B

                                                            MD5

                                                            99914b932bd37a50b983c5e7c90ae93b

                                                            SHA1

                                                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                            SHA256

                                                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                            SHA512

                                                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                            Filesize

                                                            107KB

                                                            MD5

                                                            2b66d93c82a06797cdfd9df96a09e74a

                                                            SHA1

                                                            5f7eb526ee8a0c519b5d86c845fea8afd15b0c28

                                                            SHA256

                                                            d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954

                                                            SHA512

                                                            95e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            46295cac801e5d4857d09837238a6394

                                                            SHA1

                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                            SHA256

                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                            SHA512

                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001

                                                            Filesize

                                                            23B

                                                            MD5

                                                            3fd11ff447c1ee23538dc4d9724427a3

                                                            SHA1

                                                            1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                            SHA256

                                                            720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                            SHA512

                                                            10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                            Filesize

                                                            176B

                                                            MD5

                                                            c54cc736a77b3c587c92df8c338100b7

                                                            SHA1

                                                            ca595700be05c517db8a0f7e5376c9e3b849d3ed

                                                            SHA256

                                                            37c39761046419a35ac2bc7a03452f19d410aaa3de6dbdb3f99c3a93193f0e79

                                                            SHA512

                                                            de17f42cd54bb58a88ffb58f026f185b70b821d7c58d6bd5a07b3f6875cd379ae7a81dc2472a094c8d5ce4266bf66b93d8f50ec86348b9291d62b355cd61194d

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                            Filesize

                                                            112B

                                                            MD5

                                                            17738688a4bd30a2ac51ba95b3fc8ec1

                                                            SHA1

                                                            8f112c4be3f2884284209cd06fa440a8eb2b3795

                                                            SHA256

                                                            18d1bbba589b0bbef987ce701ae9a0ce4c55c309231636b9a966fd85fcdc876b

                                                            SHA512

                                                            062af6531ae74045dc98737cf39c54bc238f23eca0a17df8ae8c339f60442a89769a78ed81613b845ac10254bdc233bac847fde23f57993c5dafaebc22099d2f

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe582287.TMP

                                                            Filesize

                                                            119B

                                                            MD5

                                                            887dcd46701f3a6e8b092fba462798e5

                                                            SHA1

                                                            de4b07b4c34f01a12f74d7961b873996a41a212b

                                                            SHA256

                                                            9a1230f21b6ba32aa1fd2073b0bf4364ff1b9b6f786ac2325484c01dcbf0333a

                                                            SHA512

                                                            f11a38e7f21494a84095d363cdd9f30fe449003a168ab92ce60bbbf00d73ce0f5a1470fbcb084c7efe2103554e1dd3028f032ca6bbc0cf20f35e40113e469c36

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt

                                                            Filesize

                                                            327B

                                                            MD5

                                                            40ba63c9670c5a19be1565487bbce95c

                                                            SHA1

                                                            02de95fb2863e8137313177ec3688f15c431f64a

                                                            SHA256

                                                            c8dd18b778cee576e93e510e220ba8be93b6f07e8b9924abeecbe5068a4e45af

                                                            SHA512

                                                            f993feeed450ea9a3db70da8f9a6bf082167a6f6293ac961f05f78e9cc6141cfdb0eacb12cad880e58b1d9331f0902b7d831726c9b505cc4d017f13c4bfc4e36

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                            Filesize

                                                            22KB

                                                            MD5

                                                            889384be3b728efa1c26177048dea143

                                                            SHA1

                                                            4d5a80527fc13c7b06c3ad833c9c9857f66e4fc6

                                                            SHA256

                                                            44d678e87b0bb08813980e4ef714fe25d803ff83fa212a02cd98cc2a4ac5704a

                                                            SHA512

                                                            67eed17def8bf8929c15f19da4bf5dc5a09ced135d04104b1be95ca01f628d45b25f61a4bc8b5ef4d035a787503f66ec5beeb5e2fcb24323958696be08e7586f

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d075b208-046c-4828-8eed-0797875a600d.tmp

                                                            Filesize

                                                            1B

                                                            MD5

                                                            5058f1af8388633f609cadb75a75dc9d

                                                            SHA1

                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                            SHA256

                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                            SHA512

                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            40KB

                                                            MD5

                                                            36f775fde3b6efc3267e87ff7f322d7f

                                                            SHA1

                                                            80791d40bc4edfd9bf0041fde5e3b74e4885ab18

                                                            SHA256

                                                            5852b0c5f2aa563a5298f90679fd4865fcf0e161a5842c548bd92e9abf2254b7

                                                            SHA512

                                                            9b767b1bea52d645267b30448539643ad8c35f65b64f3eb3e011064054299428f824c864ac5d151088bb97e443b0ce59a3b22ee6d51d90b72b131b33bafcf853

                                                          • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            273d408e6c1992624d685068feeaa816

                                                            SHA1

                                                            76d92607d70b10fc592226dd9f19225dc3e0bf05

                                                            SHA256

                                                            37f408b0d098e5dcd96bd81448673387b3c8d10c41025a209a8fc33a5399762e

                                                            SHA512

                                                            3fd22046db9ee4179ce5336574f8ce0f793511a8244c76369ec760cc9e88fa67a790ae56e93d7521a011763735d849de9354ae109dfdd9bdbbba7b6bc625b23d

                                                          • C:\Users\Admin\AppData\Local\Temp\scoped_dir5552_1847889656\30aca304-435c-482a-bc11-f1402c2092f3.tmp

                                                            Filesize

                                                            152KB

                                                            MD5

                                                            dd9bf8448d3ddcfd067967f01e8bf6d7

                                                            SHA1

                                                            d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                            SHA256

                                                            fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                            SHA512

                                                            65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                          • C:\Users\Admin\AppData\Local\Temp\tmp683F.tmp.bat

                                                            Filesize

                                                            288B

                                                            MD5

                                                            222b60ec90fa50f61520dacef0eca8d2

                                                            SHA1

                                                            54733dbe0330504403d4d7f2718e7809c5653ad5

                                                            SHA256

                                                            2cc69a4d3b0a160177004302f793130664ebdfcd4963c629a2dd85e84acb888a

                                                            SHA512

                                                            cf4fa34d32ac5d0e000bc41c50c99a789b835bdfaac41e0dc277369608adc47b706b0dd6da6090ff50a530600ac2a2227b20961b5c5eba93779834c09ca8a457

                                                          • memory/2856-4-0x0000019A4C1F0000-0x0000019A4C20E000-memory.dmp

                                                            Filesize

                                                            120KB

                                                          • memory/2856-3-0x00007FF99BDD0000-0x00007FF99C891000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/2856-1-0x0000019A4A530000-0x0000019A4A620000-memory.dmp

                                                            Filesize

                                                            960KB

                                                          • memory/2856-8-0x00007FF99BDD0000-0x00007FF99C891000-memory.dmp

                                                            Filesize

                                                            10.8MB

                                                          • memory/2856-2-0x0000019A64A40000-0x0000019A64AB6000-memory.dmp

                                                            Filesize

                                                            472KB

                                                          • memory/2856-0-0x00007FF99BDD3000-0x00007FF99BDD5000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/4820-13-0x0000026769FC0000-0x0000026769FFE000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4820-57-0x000002676B730000-0x000002676B752000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/4820-15-0x000002676B600000-0x000002676B6B2000-memory.dmp

                                                            Filesize

                                                            712KB