Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2023, 02:02

General

  • Target

    cc7a11c5c06e27c1aa371a4bbe60dc54.exe

  • Size

    3.5MB

  • MD5

    cc7a11c5c06e27c1aa371a4bbe60dc54

  • SHA1

    e5c8a8cdced6f18f1a1a9d057f2bd13fb4022f8f

  • SHA256

    5923ef2e2cdf62051efc753580a3d9fe6d6a3bee251b19023422eaa36d6d3b07

  • SHA512

    2731f6ea00d2bd26f8f2649a2dfa41589fdeed996343042bf69ff12fd7b69a5ef393a338aea0e87b2ca984a68eaeb4d8e6846cbe8ad81d97a49160d9952dc3b5

  • SSDEEP

    98304:kTkyoqPV5EMums4imxjnoWG++lkPVOWeYRu:kHtV1wAPGjlilRu

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 19 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc7a11c5c06e27c1aa371a4bbe60dc54.exe
    "C:\Users\Admin\AppData\Local\Temp\cc7a11c5c06e27c1aa371a4bbe60dc54.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c start https://discord.gg/TYz9dsXs7s
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/TYz9dsXs7s
        3⤵
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb457446f8,0x7ffb45744708,0x7ffb45744718
          4⤵
            PID:216
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4240
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
            4⤵
              PID:3792
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:8
              4⤵
                PID:3320
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:1
                4⤵
                  PID:4992
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:1
                  4⤵
                    PID:4512
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:1
                    4⤵
                      PID:2736
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3840 /prefetch:8
                      4⤵
                        PID:4952
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3280 /prefetch:8
                        4⤵
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2224
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:1
                        4⤵
                          PID:1092
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:1
                          4⤵
                            PID:1260
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:8
                            4⤵
                              PID:3768
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                              4⤵
                              • Drops file in Program Files directory
                              PID:800
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6b0bf5460,0x7ff6b0bf5470,0x7ff6b0bf5480
                                5⤵
                                  PID:4432
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:8
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1484
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:1
                                4⤵
                                  PID:4956
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                                  4⤵
                                    PID:628
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9504082581122124456,10669090007145291958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4612 /prefetch:2
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5764
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3760

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                462f3c1360a4b5e319363930bc4806f6

                                SHA1

                                9ba5e43d833c284b89519423f6b6dab5a859a8d0

                                SHA256

                                fec64069c72a8d223ed89a816501b3950f5e4f5dd88f289a923c5f961d259f85

                                SHA512

                                5584ef75dfb8a1907c071a194fa78f56d10d1555948dffb8afcacaaa2645fd9d842a923437d0e94fad1d1919dcef5b25bf065863405c8d2a28216df27c87a417

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                d2642245b1e4572ba7d7cd13a0675bb8

                                SHA1

                                96456510884685146d3fa2e19202fd2035d64833

                                SHA256

                                3763676934b31fe2e3078256adb25b01fdf899db6616b6b41dff3062b68e20a1

                                SHA512

                                99e35f5eefc1e654ecfcf0493ccc02475ca679d3527293f35c3adea66879e21575ab037bec77775915ec42ac53e30416c3928bc3c57910ce02f3addd880392e9

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                408B

                                MD5

                                06596c416278257367a6c46c6422e438

                                SHA1

                                fffa4fd02fdd476ac7a9fb7b910340a16945e82a

                                SHA256

                                a97a493ef41cef91633ef5f338467202407d7a2f48360c86a363a0e5288a5ba5

                                SHA512

                                6d65245283b4bcfd9d582efbd7b4921b61b0f8483332c5cfc62d46ee027bf6ed80dfe8901b563ab50379ab2d5dac3e72e3a7285ed822c8c1c10eb402f2ec2b40

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe572f1e.TMP

                                Filesize

                                48B

                                MD5

                                2d2beda616437cdea2e4e500f62b8ee6

                                SHA1

                                45254f54825faa11a64c7cabff1f310a740d1888

                                SHA256

                                d88c75d00bd178e44b47e0c915188f97c32a0690e600769bdd7535e7ff809c7a

                                SHA512

                                95d318b624707e3483bd5b87e998b5e9c472ba8dd74b2e45ae99fa76436a5a91b437fa4b7110557181f100c506f1d78ff9bbcb38026efc92eacf060391f3d636

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                Filesize

                                70KB

                                MD5

                                e5e3377341056643b0494b6842c0b544

                                SHA1

                                d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                SHA256

                                e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                SHA512

                                83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                111B

                                MD5

                                285252a2f6327d41eab203dc2f402c67

                                SHA1

                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                SHA256

                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                SHA512

                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                654B

                                MD5

                                78d9324adb7f5e769409dc2e71883de4

                                SHA1

                                0e16d58c9cc108d6334856262a49ddcdeb82b064

                                SHA256

                                6207294ec702d32729a6b698ea2f8a6722cc831be89161b313a9b8ca6ecfe791

                                SHA512

                                b3e4cba0d62230ccd10e771fb0901f4c804fb3c837ee871a6d1ee5ac0f1c0dad04deccce766d1756cb82f38e78c10ceff937a1fd450ac3a4382a6b55ef33d0f4

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                4KB

                                MD5

                                477f099c18eee7b60e444de7bae55781

                                SHA1

                                9bddb79cd2f969400635c337c13113619b3581a1

                                SHA256

                                4aff78e33c06eda8c5c2aeacbfbf34628e0dde5a046936f8e248265f5a61f2ad

                                SHA512

                                18091c74e18c173bb30a123c58804a57616401f9b5f8e71c231f7f120bb94675ec904a99372e3b9c476d130763e57f3bd8d0a0f2427a2b0f71400869d2ec324f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                5da200086eb4b615ace6ace4e3e9fe3f

                                SHA1

                                2a8dcf0feaa8c29ec265e0695bfd5816603e2a00

                                SHA256

                                15bb4fbad765bc7996c08230668f6aed611fa330484b0007dee064f0189af7af

                                SHA512

                                d811e9b37da3408d132ca3bf54c007fd7979fe3d900d8f21c6895461ac54972f967074762d9404476bfb810d0e87172b1acd29a22f9e267b3da59b36d0c737aa

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                5ad4dacc89eb76ec8e45062ffb884c87

                                SHA1

                                8e9a0c19b46ecd40fa217b435ff48101ffb336cb

                                SHA256

                                496800e5f635e6b9a600962adfbc9d4c8303e3fe19dae63ac69316ed431ad1e5

                                SHA512

                                5a86e536ebf8c91077db5265924d2c520c295879020a60b929e0d22910caf2f3602777f8028e2162ed1c8f4a91cd9aee63173bb395f002d4883e431c1efb547b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                Filesize

                                24KB

                                MD5

                                69b72d0a4a2f9cbec95b3201ca02ae2f

                                SHA1

                                fcc44ae63c9b0280a10408551a41843f8de72b21

                                SHA256

                                996c85ab362c1d17a2a6992e03fdc8a0c0372f81f8fad93970823519973c7b9c

                                SHA512

                                08d70d28f1e8d9e539a2c0fbac667a8447ea85ea7b08679139abbbbb1b6250d944468b128ed6b386782f41ca03020e3a82491acb1fe101b09635d606b1a298be

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                Filesize

                                24KB

                                MD5

                                130644a5f79b27202a13879460f2c31a

                                SHA1

                                29e213847a017531e849139c7449bce6b39cb2fa

                                SHA256

                                1306a93179e1eaf354d9daa6043ae8ffb37b76a1d1396e7b8df671485582bcd1

                                SHA512

                                fbc8606bf988cf0a6dea28c16d4394c9b1e47f6b68256132b5c85caf1ec7b516c0e3d33034db275adf267d5a84af2854f50bd38a9ed5e86eb392144c63252e01

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000001.dbtmp

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                206702161f94c5cd39fadd03f4014d98

                                SHA1

                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                SHA256

                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                SHA512

                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                Filesize

                                41B

                                MD5

                                5af87dfd673ba2115e2fcf5cfdb727ab

                                SHA1

                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                SHA256

                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                SHA512

                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                9KB

                                MD5

                                8820d02d98fe57a7ba6d8d584a8cf321

                                SHA1

                                e1588806e6df58319b96e3c4ddc28a2ae463365e

                                SHA256

                                b7eb2e7798b9649cbee8cb449ef3ba97359fc4597ee21c895bc90d22eee1813b

                                SHA512

                                0bdd80ab825a17cb704faabec987c87bc6931c28784e8db48d8996f2f52778c0918d93e5e4719e6d4bafbe02a277b18755837c821b66b75b747f744da3cef5f5

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk

                                Filesize

                                2KB

                                MD5

                                a76e251d5ba0969f67cf3d4d5b6fc324

                                SHA1

                                e6688ee18f52bd0cf300698a60dc86bd4f7e522c

                                SHA256

                                8e4747ed56f50ae30faf932fe3d32c65d54a7f469d7fc7c1204ea4d2da1e1269

                                SHA512

                                a827e129cee52b0ea93976d095b29c3924f3438ee99afa920b535e7738de4941e4e93c677fe17db1cc9413396a34f634290ee1b8dde4cabe188f75a4a3223930

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                Filesize

                                3KB

                                MD5

                                1b5dd674e32336b886e866179c366bf0

                                SHA1

                                e3bceadf618947cc3404fd968bdef0a2ab27db89

                                SHA256

                                3e4fa1cf4af6cd3c10a8c0e4abc97d70940dacc12f944a924a169cf00a9cf5fb

                                SHA512

                                e7c786db5c8b09dfee740f4bccc771d4a62e23b55771488f26973f2fdd86b48379459135a93e4c73d051c22e51e970f4569a1707d255386343badc64f3f0003e

                              • memory/948-135-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-397-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-344-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-245-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-376-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-136-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-248-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-386-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-387-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-133-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-400-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-134-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-428-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-429-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-430-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-431-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-432-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-435-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB

                              • memory/948-436-0x00007FF7C1230000-0x00007FF7C1B7B000-memory.dmp

                                Filesize

                                9.3MB