Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 12:53

General

  • Target

    VirusShare_688ada96ae2ead4fbdbf24faade64e3b.exe

  • Size

    293KB

  • MD5

    688ada96ae2ead4fbdbf24faade64e3b

  • SHA1

    8a6a3d65186161690c71b31e8d203c8370d33094

  • SHA256

    9150e5f78269d03dc63ddb2dbfa8d53151f56b3a96b26531ad7d07d5728b77f8

  • SHA512

    e7e77b3ac355a27f783b2985ed446def6886959c7e5b04ca35ce027ac567572ef742ba9a78c9dacf3bcf6ad4cdef7c04c9f4c027ccde62b44ef7ca56b6c827f4

  • SSDEEP

    6144:mmKdxjPFcMw0Tv4zBucQI4Px/WIxqwiD7atzaVNl5qTkHxqq:3KjA24zBuc54JO+iD2FabekHxqq

Malware Config

Extracted

Path

C:\PerfLogs\restore_files_grakl.txt

Ransom Note
______!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!______________ What happened to your files ? All of your files were protected by a strong encryption with RSA-2048 using CryptoWall 3.0. More information about the encryption keys using RSA-2048 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) What does this mean ? This means that the structure and data within your files have been irrevocably changed, you will not be able to work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. How did this happen ? Especially for you, on our server was generated the secret key pair RSA-2048 - public and private. All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. If you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1.http://aep554w4fm8j.fflroe598qu.com/604455AF7EF2ECC2 2.http://aoei243548ld.keedo93i1lo.com/604455AF7EF2ECC2 3. https://zpr5huq4bgmutfnf.onion.to/604455AF7EF2ECC2 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: zpr5huq4bgmutfnf.onion/604455AF7EF2ECC2 4. Follow the instructions on the site. IMPORTANT INFORMATION: Your personal page: http://aep554w4fm8j.fflroe598qu.com/604455AF7EF2ECC2 Your personal page (using TOR): zpr5huq4bgmutfnf.onion/604455AF7EF2ECC2 Your personal identification number (if you open the site (or TOR 's) directly): 604455AF7EF2ECC2
URLs

https://zpr5huq4bgmutfnf.onion.to/604455AF7EF2ECC2

http://zpr5huq4bgmutfnf.onion/604455AF7EF2ECC2

http://aep554w4fm8j.fflroe598qu.com/604455AF7EF2ECC2

Extracted

Path

C:\PerfLogs\restore_files_grakl.html

Ransom Note
<html><title>CryptoWall 3.0</title><style>a { color:green; }.tb { background:white; border-style:solid; border-width:1px; padding:3px; border-color:lime; }.ttl { font-size:13px; color:880000; }</style><body style="background:#33CCFF;"> <center><div style="text-align:left; font-family:Arial; font-size:13px; line-height:20px; margin-top:10px; width:800px; background:#F4F4F4; padding:20px; border-style:solid; border-width:5px; border-color:#BABABA;"><b><font class="ttl">What happened to your files?</b></font><br> <font style="font-size:13px;">All of your files were protected by a strong encryption with RSA-2048 using CryptoWall 3.0.<br> More information about the encryption RSA-2048 can be found here: <a href="http://en.wikipedia.org/wiki/RSA_(cryptosystem)" target="_blank">http://en.wikipedia.org/wiki/RSA_(cryptosystem)</a><br></font><br><b><font class="ttl">What does this mean?</b></font><br><font style="font-size:13px;">This means that the structure and data within your files have been irrevocably changed, you will not be able to work<br> with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them.</font><br><br><b><font class="ttl">How did this happen?</b></font> <br> <font style="font-size:13px;"> Especially for you, on our server was generated the secret key pair RSA-2048 - public and private.<br>All your files were encrypted with the public key, which has been transferred to your computer via the Internet.<br> Decrypting of YOUR FILES is only possible with the help of the private key and decrypt program, which is on our SECRET SERVER!!!.</font><br><br><b><font class="ttl">What do I do?</b></font> <br><font style="font-size:13px;">Alas, if you do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed.<br> If you really need your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist.</font><br><br><div class="tb" style="color:#880000; font-size:13px; border-width:3px;">For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: <hr><b>1.<a href="http://aep554w4fm8j.fflroe598qu.com/604455AF7EF2ECC2" target="_blank">http://aep554w4fm8j.fflroe598qu.com/604455AF7EF2ECC2</a></b><br><b>2.<a href="http://aoei243548ld.keedo93i1lo.com/604455AF7EF2ECC2" target="_blank">http://aoei243548ld.keedo93i1lo.com/604455AF7EF2ECC2</a></b><br><b>3.<a href="https://zpr5huq4bgmutfnf.onion.to/604455AF7EF2ECC2" target="_blank">https://zpr5huq4bgmutfnf.onion.to/604455AF7EF2ECC2</a></b><br></div><br><div class="tb" style="font-size:13px; border-color:#880000;">If for some reasons the addresses are not available, follow these steps: <hr>1. Download and install tor-browser: <a href="http://www.torproject.org/projects/torbrowser.html.en" target="_blank">http://www.torproject.org/projects/torbrowser.html.en</a><br>2. After a successful installation, run the browser and wait for initialization.<br>3. Type in the address bar: <font style="font-weight:bold; color:#009977;">zpr5huq4bgmutfnf.onion/604455AF7EF2ECC2</font><br>4. Follow the instructions on the site.</div><br><br><b>IMPORTANT INFORMATION:</b><br><div class="tb" style="width:790px;">Your Personal PAGE: <b><a href="http://aep554w4fm8j.fflroe598qu.com/604455AF7EF2ECC2" target="_blank">http://aep554w4fm8j.fflroe598qu.com/604455AF7EF2ECC2</a></b><br><!------sadfsafasdfasdfsadf -->Your Personal PAGE (using TOR): <font style="font-weight:bold; color:#009977;">zpr5huq4bgmutfnf.onion/604455AF7EF2ECC2</font><br>Your personal code (if you open the site (or TOR 's) directly): <font style="font-weight:bold; color:#770000;">604455AF7EF2ECC2</font><br></div></div></center></body></html>

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (1206) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_688ada96ae2ead4fbdbf24faade64e3b.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_688ada96ae2ead4fbdbf24faade64e3b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_688ada96ae2ead4fbdbf24faade64e3b.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_688ada96ae2ead4fbdbf24faade64e3b.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE >> NUL
        3⤵
          PID:3048
        • C:\Users\Admin\AppData\Roaming\svcjxc.exe
          C:\Users\Admin\AppData\Roaming\svcjxc.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:720
    • C:\Users\Admin\AppData\Roaming\svcjxc.exe
      C:\Users\Admin\AppData\Roaming\svcjxc.exe
      1⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3468
      • C:\Windows\System32\vssadmin.exe
        "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
        2⤵
        • Interacts with shadow copies
        PID:2924
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RESTORE_FILES.TXT
        2⤵
        • Opens file in notepad (likely ransom note)
        PID:3484
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RESTORE_FILES.HTML
        2⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
          3⤵
            PID:3524
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:8
            3⤵
              PID:252
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
              3⤵
                PID:2400
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                3⤵
                  PID:2924
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
                  3⤵
                    PID:1176
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:8
                    3⤵
                      PID:1512
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:8
                      3⤵
                        PID:4616
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:1
                        3⤵
                          PID:3496
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:1
                          3⤵
                            PID:2864
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:1
                            3⤵
                              PID:260
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14174019195231753578,14694878730649920407,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                              3⤵
                                PID:5024
                            • C:\Windows\System32\vssadmin.exe
                              "C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet
                              2⤵
                              • Interacts with shadow copies
                              PID:3408
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\svcjxc.exe >> NUL
                              2⤵
                                PID:5776
                            • C:\Windows\system32\vssvc.exe
                              C:\Windows\system32\vssvc.exe
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3900
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe8c546f8,0x7fffe8c54708,0x7fffe8c54718
                              1⤵
                                PID:2512
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3204
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3448

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\PerfLogs\restore_files_grakl.html

                                    Filesize

                                    3KB

                                    MD5

                                    33a4156392b6f4152cbc0f94802496af

                                    SHA1

                                    97c3c624d2bd48b15bdcd624d1962bb316e44d72

                                    SHA256

                                    1478def51b8af24aad2ea4e10c439caf76c063c081801ac0c842a236d10d6f26

                                    SHA512

                                    4930ce71abc1e3ec6a6aac399bdd1893f64599435413fa9f3c405223cc6f12a1715c78b80a15f8d20fad899624860c921d9dc09d5d6d2770a92db9fe69432ceb

                                  • C:\PerfLogs\restore_files_grakl.txt

                                    Filesize

                                    2KB

                                    MD5

                                    b9696b7611b73b8355b634cdf0e385f5

                                    SHA1

                                    9ca44172fa6f5adc02d54e3b6bc87be75496a922

                                    SHA256

                                    d8da3cc4610269d94d6cc4224386cef34431a93614c7493f5f038f46e771624f

                                    SHA512

                                    2bbd1f604292b8df9d6e0973b0928ed971cb8c810f3b4c48a8c598306ec71fced9077ee3500a0e34a96d0a2dfe72e6ba12ac14a07840b5a099d2c2e8c78dac6d

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E62A8F547B79FBF11B7311BEEA0EDEDB

                                    Filesize

                                    5B

                                    MD5

                                    5bfa51f3a417b98e7443eca90fc94703

                                    SHA1

                                    8c015d80b8a23f780bdd215dc842b0f5551f63bd

                                    SHA256

                                    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

                                    SHA512

                                    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E62A8F547B79FBF11B7311BEEA0EDEDB

                                    Filesize

                                    426B

                                    MD5

                                    4f5e682bc91c01d0bb35649e74c9a0cd

                                    SHA1

                                    800005ddd6f74d0752a749107153b9bcb047e31f

                                    SHA256

                                    79ba38344d76c5a719c309dc82acf9b555b52140cdbfa6f08199758918e6d970

                                    SHA512

                                    75127aba689866a6af7044cd5ff3b6498af53e0620a811568ec44245404f7aa81eb5bd42dbd871d723466e45ee3bcd683ddf9b041b715b0dff50d8a94d8c4813

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    bcaf436ee5fed204f08c14d7517436eb

                                    SHA1

                                    637817252f1e2ab00275cd5b5a285a22980295ff

                                    SHA256

                                    de776d807ae7f2e809af69746f85ea99e0771bbdaaed78a764a6035dabe7f120

                                    SHA512

                                    7e6cf2fdffdcf444f6ef4a50a6f9ef1dfb853301467e3f4784c9ee905c3bf159dc3ee9145d77dbf72637d5b99242525eb951b91c020e5f4e5cfcfd965443258c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    111B

                                    MD5

                                    285252a2f6327d41eab203dc2f402c67

                                    SHA1

                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                    SHA256

                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                    SHA512

                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    82282f2db57bc605eef6d7f245d4beb7

                                    SHA1

                                    fcffab09b8dac5373e626dd09f4aaa4367a945f7

                                    SHA256

                                    fdb7b74b6e23a9380385e28ec70e3dd5bdb56085a2a0024be16e0667c78138de

                                    SHA512

                                    6f1c8923c29720e93e284075c82a8e47de0a589c598d01b9d7ddb52e6dd51864fa5a29584efc05f3aefb3d260733856eb91f9a239b9fd0b01093bd173c693d3d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    7ce3570f57fee5ee5e4674881c3501c8

                                    SHA1

                                    fec32c12db1c08bfaba4c5e14ec8a6f7f0733c14

                                    SHA256

                                    5b1658ecd9763d07e5d365333824ffc412818e5b2bbc06b5e2ef36db281dca13

                                    SHA512

                                    442a29d37a327da3e3703e00329db9ef99aa46b31737d1e604dffba4429245b8dc822e2ba5d88bbe842c87a1d3ccb35b201718968949d81af63b81e9b23dccf1

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                    Filesize

                                    24KB

                                    MD5

                                    b0ba6f0eee8f998b4d78bc4934f5fd17

                                    SHA1

                                    589653d624de363d3e8869c169441b143c1f39ad

                                    SHA256

                                    4b5ee509e727accbd11493dda2c1d512e7dbfaff66c4f5f7ea9c2d2ccd06151f

                                    SHA512

                                    e9a165da246c6b80fc38431538203cf03f95794184ff63f00c9500f8919a2028b803f64b670e685185eed72df0509e3185c9b434fdbf2bc7af36021d46bd08d9

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    9020f2f7e89ad13a2bbef886fbbdc578

                                    SHA1

                                    ad48cd549d6427380ce4b95eb8bb66c0e7250e7c

                                    SHA256

                                    e136deee6bad6507db6d9bd9b199791cbae8fa350830639a78e8fb149e71da7c

                                    SHA512

                                    1964175e53f101a6238b900e4ed0e7fc8c98b9f420d8dfe41d04ed05bcfe05319250d62b1bafedd29d5076dbc29e0f58c87bd5858ffd5abda27baeb6fe4740ee

                                  • C:\Users\Admin\AppData\Roaming\svcjxc.exe

                                    Filesize

                                    293KB

                                    MD5

                                    688ada96ae2ead4fbdbf24faade64e3b

                                    SHA1

                                    8a6a3d65186161690c71b31e8d203c8370d33094

                                    SHA256

                                    9150e5f78269d03dc63ddb2dbfa8d53151f56b3a96b26531ad7d07d5728b77f8

                                    SHA512

                                    e7e77b3ac355a27f783b2985ed446def6886959c7e5b04ca35ce027ac567572ef742ba9a78c9dacf3bcf6ad4cdef7c04c9f4c027ccde62b44ef7ca56b6c827f4

                                  • memory/720-19-0x00000000747D0000-0x0000000074D81000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/720-15-0x00000000018F0000-0x0000000001900000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/720-14-0x00000000747D0000-0x0000000074D81000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2936-0-0x0000000075260000-0x0000000075811000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2936-5-0x0000000004C40000-0x0000000004C41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2936-7-0x0000000075260000-0x0000000075811000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2936-2-0x0000000075260000-0x0000000075811000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2936-1-0x0000000000910000-0x0000000000920000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3468-18-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-24-0x00000000750F0000-0x0000000075129000-memory.dmp

                                    Filesize

                                    228KB

                                  • memory/3468-25-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-27-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-8763-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-28-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-8783-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-8879-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-8920-0x00000000750F0000-0x0000000075129000-memory.dmp

                                    Filesize

                                    228KB

                                  • memory/3468-30-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-21-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-20-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-8919-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/3468-8880-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/4888-23-0x00000000750F0000-0x0000000075129000-memory.dmp

                                    Filesize

                                    228KB

                                  • memory/4888-6-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/4888-8-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/4888-3-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB

                                  • memory/4888-9-0x00000000750F0000-0x0000000075129000-memory.dmp

                                    Filesize

                                    228KB

                                  • memory/4888-22-0x0000000000400000-0x00000000004DF000-memory.dmp

                                    Filesize

                                    892KB