Analysis

  • max time kernel
    340s
  • max time network
    349s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • submitted
    13-02-2024 05:30

General

Malware Config

Extracted

Family

darkgate

Botnet

admin888

C2

prodomainnameeforappru.com

Attributes
  • anti_analysis

    true

  • anti_debug

    false

  • anti_vm

    true

  • c2_port

    443

  • check_disk

    true

  • check_ram

    false

  • check_xeon

    false

  • crypter_au3

    false

  • crypter_dll

    false

  • crypter_raw_stub

    false

  • internal_mutex

    VzXLKSZE

  • minimum_disk

    50

  • minimum_ram

    7000

  • ping_interval

    6

  • rootkit

    false

  • startup_persistence

    true

  • username

    admin888

Signatures

  • DarkGate

    DarkGate is an infostealer written in C++.

  • Darkgate family
  • Detect DarkGate stealer 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Command and Scripting Interpreter: AutoIT 1 TTPs 1 IoCs

    Using AutoIT for possible automate script.

  • Drops file in Windows directory 9 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 57 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\build-x64.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3244
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2080
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D21F71F8818E49E63AF13DF82F67284B
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:3040
      • C:\Windows\SysWOW64\EXPAND.EXE
        "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2788
      • C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\files\iTunesHelper.exe
        "C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\files\iTunesHelper.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1800
        • \??\c:\temp\Autoit3.exe
          "c:\temp\Autoit3.exe" c:\temp\script.a3x
          4⤵
          • Command and Scripting Interpreter: AutoIT
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          PID:2348
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\files"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1468
      • C:\Windows\SysWOW64\ICACLS.EXE
        "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\." /SETINTEGRITYLEVEL (CI)(OI)LOW
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:3688
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3400
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1420
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3672
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffaa89546f8,0x7ffaa8954708,0x7ffaa8954718
        2⤵
          PID:652
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
          2⤵
            PID:2532
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:736
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
            2⤵
              PID:3044
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
              2⤵
                PID:4848
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                2⤵
                  PID:4656
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1
                  2⤵
                    PID:4940
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:1
                    2⤵
                      PID:3876
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                      2⤵
                        PID:4132
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2424
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:1
                        2⤵
                          PID:3700
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                          2⤵
                            PID:864
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:1
                            2⤵
                              PID:800
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:1
                              2⤵
                                PID:1700
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                                2⤵
                                  PID:4496
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:1
                                  2⤵
                                    PID:2124
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:1
                                    2⤵
                                      PID:216
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5004 /prefetch:8
                                      2⤵
                                        PID:392
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:8
                                        2⤵
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4272
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7096637401227758061,7047537533548045911,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6132 /prefetch:2
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1052
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:2504
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:5008

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_A55A1F98A2E2349B736808E9897028A5

                                          Filesize

                                          1KB

                                          MD5

                                          d8122b7238b377214a0a699eb8d9a2ea

                                          SHA1

                                          25284d30ae60e1f98c87b1e079f12546710c95e2

                                          SHA256

                                          595ee0bb73832a27c34b4e0c67dd3395fc54ec7e4f982f14e8557711940543a8

                                          SHA512

                                          3faf35e0154045d78ae97ec4aff589e8182143c99625ee5ca26071c188afa19809c428c9df3cdca03ca0c2a59d41ff8fc500116184923a622a2bed92657cf1d2

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

                                          Filesize

                                          1KB

                                          MD5

                                          53d6a8226f51f7cfa90b7a37959d118e

                                          SHA1

                                          33dde569d4c51135365540a05be9ce3f75991d40

                                          SHA256

                                          d40fef148070013775aa6a648b88324e29da52d817323e8b157a6255abdf04d4

                                          SHA512

                                          8b84e6647722db27d62fcc23f7f39be137badc5b36daa8b13580dfff7714b80433eb8585cc027f7939cc2e322c85d35ff595c172a35cfebf82f25407eed46b45

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_A55A1F98A2E2349B736808E9897028A5

                                          Filesize

                                          540B

                                          MD5

                                          b2214e120c47d75dbc9316cdfa311d64

                                          SHA1

                                          59bb1d1915c8f5b382923133d53dd1c43bb25005

                                          SHA256

                                          6a9f68ff7ef54f22d9070dcb1fc8a83130cd9c08d75efb5c8cfcfed17355d35a

                                          SHA512

                                          b89b18c526c179c5a5767e5ae4875d8b2e564a01652174b456f642edcafbf57250423799b0cfe954eec6c0ddac3b4cb9f105f1b8d943ad6c78c4115f61a53e32

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E

                                          Filesize

                                          536B

                                          MD5

                                          c36148af8e1859719853db503fad4632

                                          SHA1

                                          5234d7b3ed729daf02e2d50672745a11a9533766

                                          SHA256

                                          8b67ee9c36814d4a476a931f07772afcf07d8248345ca036cfba4efd96509e72

                                          SHA512

                                          22efe4e9adc7d225d9ed3d67f4db78e9d113b385ff95ac10b8033be0789c5215d456cb3147e00e4a8d1e5c3b230c9937ca1bda6849bcecef51e1eead5db2d45c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          84381d71cf667d9a138ea03b3283aea5

                                          SHA1

                                          33dfc8a32806beaaafaec25850b217c856ce6c7b

                                          SHA256

                                          32dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424

                                          SHA512

                                          469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000f

                                          Filesize

                                          194KB

                                          MD5

                                          36104d04a9994182ba78be74c7ac3b0e

                                          SHA1

                                          0c049d44cd22468abb1d0711ec844e68297a7b3d

                                          SHA256

                                          ccde155056cdce86d7e51dfd4e8fb603e8d816224b1257adfcf9503139dd28f1

                                          SHA512

                                          8c115e3e5925fb01efd8dda889f4d5e890f6daaf40b10d5b8e3d9b19e15dadcb9dcf344f40c43f59a1f5428b3ee49e24e492cf0cb6826add1c03d21efdec52ba

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          1KB

                                          MD5

                                          9db333bdb72e2e81c7474f0876557292

                                          SHA1

                                          6d4e6481db62f39511f83288567ba1082ab6fb1c

                                          SHA256

                                          8ef68836c50341e79c89398d46b4f9500270fb18ba68734d885e5a65944dd6f9

                                          SHA512

                                          faacdf4e05ba3165ae259076bd62cfd6012ca4815ba347b18e27ad20f4661d583dee9a60fd9a959b261f8e8f12f63deec87e8644b9ec471dae99f393626d8beb

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          111B

                                          MD5

                                          285252a2f6327d41eab203dc2f402c67

                                          SHA1

                                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                          SHA256

                                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                          SHA512

                                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                          Filesize

                                          2KB

                                          MD5

                                          4b584b62356a2dc4ec7707945437954f

                                          SHA1

                                          cf114a2ce22b33fbdbd693754218cd74a41f51a3

                                          SHA256

                                          4e9723d1729f4ffe009d5c5818c1615ae5a01fd9440efa8564c58a6e29510864

                                          SHA512

                                          ebc899cbbd532766d3b6613a47f82397f14bc4c59474d3304ba34edd8466ff3f084b722c10b376d4449d5cc862029d27c0d23edc5acde3e19b98320f6ac40795

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          7KB

                                          MD5

                                          2a513b7afe98ddc5fc64c5f0cf04662c

                                          SHA1

                                          c92523a1e7ed09d0b97b790a65d0d8dee1719443

                                          SHA256

                                          c45865bb4939fa48c90bacceace60c51a3d29476c2491a5e3194ae245278c37c

                                          SHA512

                                          5d25de6a64bcb39122c21da268431213dd44152be157edd6f148abc45a79e48ba19dca8b6eb561c9f8c530e4874fd9bc40bdaa5757fa2de99e92258a2bb0e379

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          7KB

                                          MD5

                                          b61fa8837d60eec258d90b8889e3448e

                                          SHA1

                                          41dbbdd01e444ca47b0311bfef5acc7a767ffe70

                                          SHA256

                                          f0b44d528407044791cad23057ae33fd164929f0c5640af5c1378fe0a9fe4e6c

                                          SHA512

                                          c45d7f58b09e2785708b323f8071f4cca0d9e24aaf21b7944503e1e649e9973c9ba21572d09bf4156f7c9ac924f067c62a6c864944f6e46e0fe7ef5d1090181d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          7KB

                                          MD5

                                          8e1166352afedcd44d8ac0b9a604ec24

                                          SHA1

                                          1ed4d596b9cd12421f20aa8461e3d68dd2a4f45e

                                          SHA256

                                          9805899d443086636f939b97925b76fb24c970a1db9a6dd38d1a4c98cf5cb0a4

                                          SHA512

                                          d63d2435b5e9cd84506614a84054d4a93792df459d4425581ff6106fd20e9e20efde45b814bbc71a0146926452b96dbf599156dc1656061d05da512c7fadd46d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                          Filesize

                                          24KB

                                          MD5

                                          35f77ec6332f541cd8469e0d77af0959

                                          SHA1

                                          abaec73284cee460025c6fcbe3b4d9b6c00f628c

                                          SHA256

                                          f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7

                                          SHA512

                                          e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                          Filesize

                                          72B

                                          MD5

                                          68ac8d6690300218bbc577fac3c66555

                                          SHA1

                                          66bb4bd3c0e3b8d7e2dde73c6ecfc264bb0e3636

                                          SHA256

                                          2147139b9c4a548218f2ecbd2c9d69a1b1fab17127a53a91609aa9bc809c7e43

                                          SHA512

                                          aaa168eaa6d876ba5e06ceb2219d07426ed580ec319a7f3cbfa0d195a910855b20eeb70511cca6cb998eec7eaa086c21aa11667c936869a1f9b945bc37ded447

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5ae4a4.TMP

                                          Filesize

                                          48B

                                          MD5

                                          ea355700d9cd32a4f6c3ca237187cef1

                                          SHA1

                                          afebb64003bd8f2c6b5d18405c6228df36f4a8cd

                                          SHA256

                                          f536583e89030543af5a4942a29f8dac6fcecf278e5d5611bcebc87bb1413fcb

                                          SHA512

                                          99049da6118868c8d24a6e3f9a3fccd675379dcd8177e1d17b510a2db4929035738074e104cf73b14c8d268e2a77301b8a4d735066fbcbd5fdee139aee304be8

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a5f903c6-c533-4e42-9170-369498d58fa6.tmp

                                          Filesize

                                          5KB

                                          MD5

                                          2b077e551fb0daf46e415dc5a178a8fd

                                          SHA1

                                          c076d5915a3f946bf08c5e16710d2eeb51dbc736

                                          SHA256

                                          45d27b493c50f8526aafa29a759a4b56fece6115fcbe1bed45bb9a4619fcbc6a

                                          SHA512

                                          f45c7287a4b9fa9b13a309952ed375d9b9d532f0a4466cef9e0cd3e4f936a704db3d1233f6354bf79c3d646950db99fed25e78d150723df6a3474abe75578e81

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\be127b5f-ba84-4b3d-a137-b1f44980ace9.tmp

                                          Filesize

                                          6KB

                                          MD5

                                          267e49b928935eb893c00ebb9627bab2

                                          SHA1

                                          c75066ea8cf8d7766aa17e26ed3f4b08aa617b40

                                          SHA256

                                          0ef9ca141333ece903f5020b1ba9997113a62ed4c588d1833e5bcfa0468dbce0

                                          SHA512

                                          6a09f2b26591f8b63e1533e9ea4c24e7e7efdb95e5463563e7e7292f522b82ef4ca946422586f4eeb1b78b78190f062f8e5722a875b8570e1789013354fd774d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          41dcc7c962b65b52b7a1f24235fbd0ab

                                          SHA1

                                          f4fd0c38f99bbbd536c0b4641104b6132fb8a559

                                          SHA256

                                          775d10bb2251eacad2d4d70f8bf578c60d0d8ba159c12d80f51dc8e38c55c00a

                                          SHA512

                                          1f57bd95f706582fb7f108f7778b84d58b896485f3d1ccb4730ba002c5ffaca8a2ad76847890945a6a1169ea434cffdfee26c631f3abb3adcc6c883b6d04ac5b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          53d6e49fc7f209a0254e139c61dc42f4

                                          SHA1

                                          1a76c9507bbea8055d68b0660d1b4ad56501c787

                                          SHA256

                                          38a737fc362648be03383de124814314ecdd467ddfe151ba77aeda3d9b6612d2

                                          SHA512

                                          34317aeabdd0f20c5d90b602db3fa53e222764bbebb1595e038748fd3d9dff10619eba2c959fecadea934dfec260f7f1d5aabfcf4241d257c7bc964cc14858d6

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          10KB

                                          MD5

                                          94db79f89a8e4a57d96c4e4101cbb2c6

                                          SHA1

                                          228817851ad5f680d567c1369d58b0f4694d185b

                                          SHA256

                                          72f70d3840f56e90b33a6c855cd68272eff45099192ee114b435a8d5a3c93e1e

                                          SHA512

                                          b1231fc364c4963f9c0c762bd7e37a7c4c090698c3ec701f5d02cbe057722dea6c3880f6a319674e338aa3b7a09848880c115e516f9ab7718c360874b7b552e2

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db

                                          Filesize

                                          28KB

                                          MD5

                                          4bf7ea291151bd335a0498584b1b9884

                                          SHA1

                                          810020879af4e85d108be9fbb7d9f8dd72502fe2

                                          SHA256

                                          62cd1b041d57d14790a2612693ce2cb1a8570888fc06fb47f46b73f7ba3a61bb

                                          SHA512

                                          78e98118dc7f3744a78feefade187a486341534db3c5a2a5b4b28875cb8573561ad24b370215470f5f678891e4299d2ea90c7cf1c30e41342efef61ce2e0dc51

                                        • C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\files.cab

                                          Filesize

                                          5.6MB

                                          MD5

                                          a6f0fa38c1ef89290ee787f7577993ad

                                          SHA1

                                          1b03510e8c5a1a3c976086327ebab3c8acc19550

                                          SHA256

                                          599ab65935afd40c3bc7f1734cbb8f3c8c7b4b16333b994472f34585ebebe882

                                          SHA512

                                          9040548c6937e93168e57c1b3d18c20d21702d9632096191bab84929f18de0bce4cc31bb0f178b9d34f9259e6176bc4a8d5b86fe21ceec0b5a24ea2809acc68c

                                        • C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\files\CoreFoundation.dll

                                          Filesize

                                          3.6MB

                                          MD5

                                          3b81ffed1e2d61f739bb241e395ce563

                                          SHA1

                                          ce08355cb95ab3d1ad177eb641acfa0339ce73d4

                                          SHA256

                                          f049356bb6a8a7cd82a58cdc9e48c492992d91088dda383bd597ff156d8d2929

                                          SHA512

                                          06ee1ca4b102d90bd1390c9e7fefecfa7fd8ebc131a8fd24d76a0aa51655cb254b021ba05ca976910395c08658171f0f8c1f6b1fec0fbc6c9ec5b906fddb606d

                                        • C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\files\iTunesHelper.exe

                                          Filesize

                                          358KB

                                          MD5

                                          ed6a1c72a75dee15a6fa75873cd64975

                                          SHA1

                                          67a15ca72e3156f8be6c46391e184087e47f4a0d

                                          SHA256

                                          0d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda

                                          SHA512

                                          256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03

                                        • C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\files\sqlite3.dll

                                          Filesize

                                          1.6MB

                                          MD5

                                          0f64a8b96eee3823ec3a1bfe253e82be

                                          SHA1

                                          e47acbb2fb97d05ce5222ba2737a5b0c0f039a0c

                                          SHA256

                                          17158c1a804bbf073d7f0f64a9c974312b3967a43bdc029219ab62545b94e724

                                          SHA512

                                          4d08d96bfe4ed497ca01d6f76acf1f5138d775b56556923b24e1e86cbd26fd54b6f517c8d3211b80332f90fe46cb77e347280636dc984ded2da8842aff9a5f43

                                        • C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\msiwrapper.ini

                                          Filesize

                                          448B

                                          MD5

                                          a4062e45e7248165799f296ee3d178a6

                                          SHA1

                                          346bb8e1da0d110a035e064aa6e0746c61ee367f

                                          SHA256

                                          448d889d1ec85857cebb8048235f496f97156d2d471d4c3ad29a9d63e1bc36f3

                                          SHA512

                                          0e5bdcc607facbdaf44c71b2b6a5535dd4341b8d77d1706a24b462288ccef3ff40c8810ac64b3d9c7c9381b202aa68b5770a8de34a1806653c38d07940e0eafe

                                        • C:\Users\Admin\AppData\Local\Temp\MW-e31f729b-4849-4e6d-8144-06fabb46edd2\msiwrapper.ini

                                          Filesize

                                          1KB

                                          MD5

                                          4e59a5043c0eda08e0198418fa70f191

                                          SHA1

                                          457dc97fcf241c7ffb049c0741c3211669f58d77

                                          SHA256

                                          266a2a6d49b68f340c47f7116ea8cd6d5bb5a709400e9a1d57bb3209ff90869a

                                          SHA512

                                          2ac513ccd163f109f83408503b1f7d0ad1dd28e1847826d057a8b7675b97f154af2007ff22edc2cecd8a5a3812ab1bbf022f49f7b0f20758cd64288f7c2976ab

                                        • C:\Windows\Installer\MSIDD7F.tmp

                                          Filesize

                                          208KB

                                          MD5

                                          d82b3fb861129c5d71f0cd2874f97216

                                          SHA1

                                          f3fe341d79224126e950d2691d574d147102b18d

                                          SHA256

                                          107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

                                          SHA512

                                          244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

                                        • C:\temp\Autoit3.exe

                                          Filesize

                                          872KB

                                          MD5

                                          c56b5f0201a3b3de53e561fe76912bfd

                                          SHA1

                                          2a4062e10a5de813f5688221dbeb3f3ff33eb417

                                          SHA256

                                          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                                          SHA512

                                          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                                        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                          Filesize

                                          23.0MB

                                          MD5

                                          6b98ce867d6215a48a8eb1885d30dde1

                                          SHA1

                                          1c473cec984dda05eef0a6f1acf35d79e5d664c4

                                          SHA256

                                          4d6549201ec0eaff6cf54811f6f97a74a950e7509177d04611127aed79949100

                                          SHA512

                                          b9262f9eeef579f7efb261d398f7da020d37b25991323534343fa8d5acf70cc6a6b9908007d29ab70fc54293ea6d900abded87be42d2fa50bba665122fae4ecb

                                        • \??\Volume{d253324a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{df01374e-ffad-4b3e-aeb7-305a6f77065c}_OnDiskSnapshotProp

                                          Filesize

                                          6KB

                                          MD5

                                          759c294442cb9f5ac97c1a3d85916006

                                          SHA1

                                          35b56cab4da7571840ce9bb306ac1b5694e75c35

                                          SHA256

                                          1845dcc8726815c058418c47169dcfc6fa6848e82181f1d11bb949a436d30a13

                                          SHA512

                                          5cde646415fc9215a14666729ae26c15079bf52d47468de619b88644ddc9b0913336fe63b268f3d0bb717940ef99bdb4c54e7c4834261b9eade47e8b3bffa2f2

                                        • \??\c:\temp\script.a3x

                                          Filesize

                                          473KB

                                          MD5

                                          33ca8bc4ac593027fd3e83ba44be54fc

                                          SHA1

                                          07e2e129a5b0a694d38ac29bc21f74eda100519f

                                          SHA256

                                          2296f929340976c680d199ce8e47bd7136d9f4c1f7abc9df79843e094f894236

                                          SHA512

                                          05f6f03e69a7d31686f422e422d61161bde45173a6453fdf0392a7a084c9bd69c7c0ed11eb7a37281481eea14497e95c51dfaded21e2ff943fee3f371592db61

                                        • \??\c:\temp\test.txt

                                          Filesize

                                          76B

                                          MD5

                                          e0cb113b19ce53ef7b72edbb0a4937dc

                                          SHA1

                                          2499a76ad9ec4a44571bfd8083e09b23373f9f69

                                          SHA256

                                          03bed76f17b8574d05e84b81f81c09a33b1ae1555c2caf4783e059b689879ab6

                                          SHA512

                                          0b046a6d16d22c0faa3eb729d9b74bfbc87f3cc847fd5ddfa89e573893d215841bae320f0697090b9a30778a07210929ac9c440fca884e920b369698d90a17ca

                                        • memory/1800-105-0x00000000629E0000-0x0000000062D88000-memory.dmp

                                          Filesize

                                          3.7MB

                                        • memory/1800-96-0x000002049A350000-0x000002049A4F0000-memory.dmp

                                          Filesize

                                          1.6MB

                                        • memory/1800-107-0x000002049A350000-0x000002049A4F0000-memory.dmp

                                          Filesize

                                          1.6MB

                                        • memory/2348-104-0x0000000004910000-0x00000000058E0000-memory.dmp

                                          Filesize

                                          15.8MB

                                        • memory/2348-106-0x0000000005E10000-0x000000000616C000-memory.dmp

                                          Filesize

                                          3.4MB

                                        • memory/2348-110-0x0000000005E10000-0x000000000616C000-memory.dmp

                                          Filesize

                                          3.4MB