Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 21:54

General

  • Target

    https://cdn.discordapp.com/attachments/1211065081018978314/1211067374950809700/Gold_Loader_Fix_for_Failed_to_Manual_Map.exe?ex=65ecd962&is=65da6462&hm=e479038f7b337707a00c24e5082fa1fb3938e129f22bc5481b607184abceee2f&

Malware Config

Signatures

  • Detect Xworm Payload 2 IoCs
  • Detect ZGRat V1 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • .NET Reactor proctector 3 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 53 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1211065081018978314/1211067374950809700/Gold_Loader_Fix_for_Failed_to_Manual_Map.exe?ex=65ecd962&is=65da6462&hm=e479038f7b337707a00c24e5082fa1fb3938e129f22bc5481b607184abceee2f&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac96c46f8,0x7ffac96c4708,0x7ffac96c4718
      2⤵
        PID:2560
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4684
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:4720
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:8
          2⤵
            PID:4976
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
            2⤵
              PID:2244
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:1
              2⤵
                PID:2296
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                2⤵
                  PID:4220
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2476
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1
                  2⤵
                    PID:1140
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4208 /prefetch:8
                    2⤵
                      PID:3040
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6016 /prefetch:8
                      2⤵
                        PID:4612
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4464
                      • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                        "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                        2⤵
                        • Checks computer location settings
                        • Drops startup file
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        PID:4516
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe'
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2812
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Gold_Loader_Fix_for_Failed_to_Manual_Map.exe'
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5216
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5436
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                          3⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5608
                        • C:\Windows\System32\schtasks.exe
                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
                          3⤵
                          • Creates scheduled task(s)
                          PID:5984
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:1
                        2⤵
                          PID:4504
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:1
                          2⤵
                            PID:3740
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                            2⤵
                              PID:880
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:1
                              2⤵
                                PID:4500
                              • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                                "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5636
                              • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                                "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5708
                              • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                                "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:6088
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:1
                                2⤵
                                  PID:6028
                                • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                                  "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5096
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6272 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4652
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3592
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:916
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:616
                                    • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                                      "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4300
                                    • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                                      "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5504
                                    • C:\Users\Admin\AppData\Roaming\XClient.exe
                                      C:\Users\Admin\AppData\Roaming\XClient.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2072
                                    • C:\Windows\system32\taskmgr.exe
                                      "C:\Windows\system32\taskmgr.exe" /7
                                      1⤵
                                      • Checks SCSI registry key(s)
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:552
                                    • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                                      "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1648
                                    • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                                      "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4528
                                    • C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe
                                      "C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5324

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe.log

                                      Filesize

                                      654B

                                      MD5

                                      2ff39f6c7249774be85fd60a8f9a245e

                                      SHA1

                                      684ff36b31aedc1e587c8496c02722c6698c1c4e

                                      SHA256

                                      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                      SHA512

                                      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                      Filesize

                                      2KB

                                      MD5

                                      d85ba6ff808d9e5444a4b369f5bc2730

                                      SHA1

                                      31aa9d96590fff6981b315e0b391b575e4c0804a

                                      SHA256

                                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                      SHA512

                                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      1f6d41bf10dc1ec1ca4e14d350bbc0b1

                                      SHA1

                                      7a62b23dc3c19e16930b5108d209c4ec937d7dfb

                                      SHA256

                                      35947f71e9cd4bda79e78d028d025dff5fe99c07ea9c767e487ca45d33a5c770

                                      SHA512

                                      046d6c2193a89f4b1b7f932730a0fc72e9fc95fbdb5514435a3e2a73415a105e4f6fa7d536ae6b24638a6aa97beb5c8777e03f597bb4bc928fa8b364b7192a13

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      4254f7a8438af12de575e00b22651d6c

                                      SHA1

                                      a3c7bde09221129451a7bb42c1707f64b178e573

                                      SHA256

                                      7f55f63c6b77511999eee973415c1f313f81bc0533a36b041820dd4e84f9879b

                                      SHA512

                                      e6a3244139cd6e09cef7dab531bff674847c7ca77218bd1f971aa9bf733a253ac311571b8d6a3fe13e13da4f506fec413f3b345a3429e09d7ceb821a7017ec70

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      186B

                                      MD5

                                      094ab275342c45551894b7940ae9ad0d

                                      SHA1

                                      2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                      SHA256

                                      ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                      SHA512

                                      19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      df20c4438fc0020aa6f5e1c42f2c9179

                                      SHA1

                                      30612a6cb493261ea46fee43c5e7e4114408b763

                                      SHA256

                                      b5cab4632c2a4046d4ab2af17ffaffb4855e356d3895ad7a40b8840b8745fa57

                                      SHA512

                                      a2ea2abe88e63150ce2c268b3343cf0d464d6eb55ba04ea612654508cbe597e7c476cc53c0e0e158b901126a42a9dc8fe0c2c0a951a3d536a568443356756836

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      c8516e3be422ae4b6c5c9c958c2a9790

                                      SHA1

                                      60003cebeb68748765839bfaf32f1d7eadf72f35

                                      SHA256

                                      af21db2994dc5d4c897450ee590129eb4c52a6af6f333ecf381f115c94e87938

                                      SHA512

                                      e13e8af35d810286964b1b935237a91d87f305305049ca554302755d7f3110a7c2379cdcfc8d57854576ecb478ce7f296f60e829d5f4d84d965c003f17629327

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      ad4d68700c65a3a52efa76ec8c20763e

                                      SHA1

                                      debaad964fc82bd931b4b94b5f87b3a1e12cb4ba

                                      SHA256

                                      3bdccc49e90a4742e751f4e155026987a204dee5a1e2f2d43174ea15bc3b8408

                                      SHA512

                                      38a91de6280231de353af8ca0cde41323a2577cdbfe56ede4d4bbaa32afb9eb12e3ecbbdfe045391acf7cfc13f94e94a9ad31209b8627c9458d8ba2ba60b2116

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      12KB

                                      MD5

                                      1ec5f91c94967d06b92c0052d9917ee1

                                      SHA1

                                      8d377cab8ff4f60906449a54ef89b55146606354

                                      SHA256

                                      41c0e965fe56192fa69cd000c477e77bfbf8969dd253bf86243f819368bd1a1f

                                      SHA512

                                      bd46884adaa42d83584ed3e34c92f36f7744ff2bae91902c2718622f35d63545daa24add17c3d2031a850593720954237a3ec44ae6680300de33b5e1bfc20908

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      2f9a156327d1090f2c8a5a77bb10f900

                                      SHA1

                                      41a3799dc5c92a649186b036f77cc8619c70d2e6

                                      SHA256

                                      7c30a052bc8c58a90984c8391f8be3941b0b4cd9d044a041e6826669db182016

                                      SHA512

                                      2e218774875cf6ce644b59125ae235c1a685705fa43ce5b5310e220c663c64028235d7a1281b1d43592b0ecd4f7f935d19100b7d4880dc26ab93e42491a43858

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      12KB

                                      MD5

                                      50437548985a3b27010dc943aac72837

                                      SHA1

                                      b226f2fb73b8c4a212f2677f067826eb65479250

                                      SHA256

                                      cee7aee0f06bb1ec923082233c9d3ba797badb9e9c89329e75c521c17cbceefb

                                      SHA512

                                      d7c572b505740188ade195b467879c49d3d711f9b132b962415c65470d84370f987b16938f79713fd6b09bddbefdc0442945dc7626a9c612655fa8f06d8a8cdf

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      944B

                                      MD5

                                      d28a889fd956d5cb3accfbaf1143eb6f

                                      SHA1

                                      157ba54b365341f8ff06707d996b3635da8446f7

                                      SHA256

                                      21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                                      SHA512

                                      0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      944B

                                      MD5

                                      f41f42c322498af0591f396c59dd4304

                                      SHA1

                                      e1e5aa68d73d48bc5e743a34f6c0fa8960ff7514

                                      SHA256

                                      d8bd9a4a363ff2ac2dc887759ec6ba4215a4ce0925a8fb9c531573458ee4a31c

                                      SHA512

                                      2328a1b402b4fb0de9c451fb630eab58549129d3bcfb70b9834cfbd16065ebaadec006b309ea17ac182d34c53e01705cbc9e0196eb0cbd62600c866e79a1844f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      944B

                                      MD5

                                      499298c8da8c8b6e630c889b60905388

                                      SHA1

                                      b3b519bebf9861bcdad6e2e6426c2e8a96fd8056

                                      SHA256

                                      2e5392338aeb35e2d1ca8c95cde814389a76808da33de106e860c5659c6823ca

                                      SHA512

                                      9da91784102b7fcd981d9cd84e787b4609d6c55f359df1bc8bf27759233a8be461552c370f13a21dd953c3f1254b15fe33b6ab89745cb36e7b382934487eb069

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oz5uhgi0.53u.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\Downloads\Unconfirmed 893931.crdownload

                                      Filesize

                                      469KB

                                      MD5

                                      c672a19a3054309f3d83dc7142519d4d

                                      SHA1

                                      c100bee4786d33dc6dafddcf36afefde7eff5086

                                      SHA256

                                      21a17e24a75b812e83db123c3742729eb4d96fe8e51154321cfda18aa06aaa1c

                                      SHA512

                                      64187db968b728f9ba161d641692bb4687fe6cd4c573abd0bb90bc82a693aecd829c266c9926084b336b4a10b3f5b47b8fbe4e2a469f78116608b004b5bfeab6

                                    • memory/552-286-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/552-285-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/552-291-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/552-290-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/552-281-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/552-280-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/552-273-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/552-287-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/552-289-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/552-288-0x0000025A3F550000-0x0000025A3F551000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1648-295-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/1648-305-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/2072-260-0x00000000024B0000-0x00000000024C0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/2072-293-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/2072-259-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/2812-106-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/2812-85-0x000001CC86990000-0x000001CC869A0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/2812-74-0x000001CC86990000-0x000001CC869A0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/2812-72-0x000001CC86B60000-0x000001CC86B82000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/2812-75-0x000001CC86990000-0x000001CC869A0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/2812-73-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4300-195-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4300-193-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4516-176-0x0000000002E60000-0x0000000002E70000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/4516-194-0x0000000002E60000-0x0000000002E70000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/4516-69-0x0000000002E60000-0x0000000002E70000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/4516-68-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4516-123-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4516-67-0x0000000000B40000-0x0000000000BBC000-memory.dmp

                                      Filesize

                                      496KB

                                    • memory/4516-143-0x0000000002E60000-0x0000000002E70000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/4528-316-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4528-319-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5096-251-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5096-250-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5216-122-0x0000024AF0B80000-0x0000024AF0B90000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5216-129-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5216-118-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5216-120-0x0000024AF0B80000-0x0000024AF0B90000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5216-127-0x0000024AF0B80000-0x0000024AF0B90000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5216-121-0x0000024AF0B80000-0x0000024AF0B90000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5324-324-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5324-323-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5436-145-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5436-132-0x0000022D79E50000-0x0000022D79E60000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5436-131-0x0000022D79E50000-0x0000022D79E60000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5436-130-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5504-224-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5504-225-0x0000000003040000-0x0000000003050000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5504-226-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5608-167-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5608-149-0x000001AACA510000-0x000001AACA520000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5608-148-0x000001AACA510000-0x000001AACA520000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5608-152-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5608-165-0x000001AACA510000-0x000001AACA520000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5636-147-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5636-169-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5636-150-0x000000001B380000-0x000000001B390000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5708-154-0x000000001AD50000-0x000000001AD60000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/5708-153-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/5708-172-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/6088-180-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/6088-181-0x000000001AF80000-0x000000001AF90000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/6088-182-0x00007FFAB63E0000-0x00007FFAB6EA1000-memory.dmp

                                      Filesize

                                      10.8MB