Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/03/2024, 07:00

240309-hs3csaee8x 3

09/03/2024, 06:56

240309-hqcpcaee6s 8

09/03/2024, 06:54

240309-hpga5see5v 10

Analysis

  • max time kernel
    72s
  • max time network
    73s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 06:54

Errors

Reason
Machine shutdown

General

  • Target

    OrangeWare BETA.exe

  • Size

    605KB

  • MD5

    5c45ec1854de2fab9b7c6b24e5bc5a58

  • SHA1

    12d3e02b9391aab1b22d76eab1c87497bcbd51f0

  • SHA256

    e25cea03b9a18d1c3e9179d7bb0ef7eee5b10dec80ef50e07599f7ae92223d05

  • SHA512

    11a6e38aa2e402a00e79abf0f6175428bee3350f1d3a88009b39fc036216a74f2e75d80396930b5dee4e293d4c3e984bc1986913ded6033a6c372bf4d1099563

  • SSDEEP

    6144:MX+wg3G5Q1IAZKSppJpjlYN0jqzMQPwmEykjNNAC0z4G7ennOJ4ZDvdQlTzI8Oxv:MXbg3FIoxPu08MQPwTACK5enTZDvgT1

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OrangeWare BETA.exe
    "C:\Users\Admin\AppData\Local\Temp\OrangeWare BETA.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:3080
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cls
        2⤵
          PID:4976
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cls
          2⤵
            PID:1104
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
          1⤵
          • Enumerates system info in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4812
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde33d46f8,0x7ffde33d4708,0x7ffde33d4718
            2⤵
              PID:1188
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
              2⤵
                PID:4832
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:3
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3452
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:8
                2⤵
                  PID:4268
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                  2⤵
                    PID:1360
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                    2⤵
                      PID:5000
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:1
                      2⤵
                        PID:4824
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:1
                        2⤵
                          PID:4600
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3532 /prefetch:8
                          2⤵
                            PID:2272
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3532 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1600
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:1
                            2⤵
                              PID:2272
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                              2⤵
                                PID:2736
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5284 /prefetch:8
                                2⤵
                                  PID:2908
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3464 /prefetch:8
                                  2⤵
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3664
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:1
                                  2⤵
                                    PID:5304
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:1
                                    2⤵
                                      PID:5604
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                                      2⤵
                                        PID:5684
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:1
                                        2⤵
                                          PID:6028
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:1
                                          2⤵
                                            PID:6036
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:1
                                            2⤵
                                              PID:2296
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:1
                                              2⤵
                                                PID:2352
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:1
                                                2⤵
                                                  PID:5764
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5956 /prefetch:8
                                                  2⤵
                                                    PID:5772
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5424
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:1
                                                    2⤵
                                                      PID:3440
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11983522042263237877,3260600465268883017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:1
                                                      2⤵
                                                        PID:5920
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:4372
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:1636
                                                        • C:\Windows\system32\AUDIODG.EXE
                                                          C:\Windows\system32\AUDIODG.EXE 0x3e0 0x4f0
                                                          1⤵
                                                            PID:5396
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                            1⤵
                                                              PID:5848
                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"
                                                              1⤵
                                                                PID:5700
                                                                • C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe" -burn.unelevated BurnPipe.{F36365D4-960D-49C9-BFF0-106BB03621C1} {0D444F76-184E-457A-A4CF-8B8E715F3C3E} 5700
                                                                  2⤵
                                                                  • Loads dropped DLL
                                                                  PID:5736
                                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.exe.zip\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"
                                                                1⤵
                                                                • Modifies WinLogon for persistence
                                                                • UAC bypass
                                                                • Disables RegEdit via registry modification
                                                                • Drops desktop.ini file(s)
                                                                • Sets desktop wallpaper using registry
                                                                • Drops file in Windows directory
                                                                PID:768
                                                              • C:\Windows\system32\LogonUI.exe
                                                                "LogonUI.exe" /flags:0x4 /state0:0xa3909855 /state1:0x41c64e6d
                                                                1⤵
                                                                • Modifies data under HKEY_USERS
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:5544

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                cbec32729772aa6c576e97df4fef48f5

                                                                SHA1

                                                                6ec173d5313f27ba1e46ad66c7bbe7c0a9767dba

                                                                SHA256

                                                                d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e

                                                                SHA512

                                                                425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                279e783b0129b64a8529800a88fbf1ee

                                                                SHA1

                                                                204c62ec8cef8467e5729cad52adae293178744f

                                                                SHA256

                                                                3619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932

                                                                SHA512

                                                                32730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                3KB

                                                                MD5

                                                                6218053ea99ed339a845dcaa71648bc7

                                                                SHA1

                                                                25395329ff82df2829460c380e9382bf6082ce05

                                                                SHA256

                                                                a08e7c7f45cd6a43cbb237648cdad4235584ce3fca130b0c9f49a40c42355595

                                                                SHA512

                                                                cbfd75835ee973a4cfe0147d1edf10565fbb822110cbb8f0fdcf10c085615c007eaabecdcc978c664be6cf9237ee37a3ada12ce15fd900367b8e55c2001e72f0

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                Filesize

                                                                111B

                                                                MD5

                                                                285252a2f6327d41eab203dc2f402c67

                                                                SHA1

                                                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                SHA256

                                                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                SHA512

                                                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                44516f8a620d37c456723432ccdd4e37

                                                                SHA1

                                                                261e93410f23b128f1521dbf1a02c3df79ce5595

                                                                SHA256

                                                                8b54c65705022dd620b3c065e77eb02f51f37976526135b01f2a38f4430f2ac5

                                                                SHA512

                                                                56be5b8abbd4b9ecafcbdedf60ad6da627cf0acfa995702fe876c51a565ce0603d0bf47e0a3c60bd0c52a45231545d0b6edc0e8526b0a7a150ec665e3455cd1f

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                ce12023bc9cc8162d4f282aafa83741f

                                                                SHA1

                                                                689a076bfb7e6797bc493e1f3fbc4257ed244fc8

                                                                SHA256

                                                                61ada9eb9bb322c9110256f88428e978ab42d91c4fcba0faa56a4137ec3d0dee

                                                                SHA512

                                                                8e004ad416d0d61c92f99084ee1c9e20ed905fca98877a5f423037b33b0827f4a35f3013dc2a04274ff96d44b9b04e7eb1652e1b7cfc1a6e396e6470d8eb8ef8

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                cec5742e632be1b0756819bacdb0fa46

                                                                SHA1

                                                                dc8b25388ad02f142ee05c4c00951aabc4a7d9c2

                                                                SHA256

                                                                b5cd51d00ba3406a92555791ecfacb01641b62ae37be2da0f3f128153f33238d

                                                                SHA512

                                                                b5b7fe58d6f2344709ae1780fce489c8239b90ba4e9868a473a1bacce27fc57591c4839fa1f60762c2b48ef10220a0adc028bdc8bcd9158a26dc6e40860c314a

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                1dbc810976e6772c97856163e579214a

                                                                SHA1

                                                                869071ec18825dbebb9c300f5003880961e9bbc8

                                                                SHA256

                                                                986b994b7310fc4a838131b35e99f28a9ba8f9dfa1bb0d2c6dba9337f1cab290

                                                                SHA512

                                                                11550134aa6593001dc586ce2e7afc49e988cd589a47cf8eb87b81012057362943ee91b8d777ce4c2c94d3a1a1c69d94cf76f541c5f3f44d98fc7872d7a97aea

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                347864555073ae9846141b883bef3576

                                                                SHA1

                                                                3237bac475b07f095cab63379e30fc26a5cf2744

                                                                SHA256

                                                                fec4d9cf85d3319999fd8f8feea4ce1e0d0fba2475cfd5c7e062c47169037e24

                                                                SHA512

                                                                a35a16da041ef807c4d02a9e89179b3f8c36fc7527275f9d9aea46d943e22dfe231e60a155529f8344a945b1263fb1528767c2c940212673815ff3b1cba3b2db

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5825a4.TMP

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                24b147bbd92f10329022be83ea49ca49

                                                                SHA1

                                                                d6d5f5ed5526005d821845d401594afa690959cd

                                                                SHA256

                                                                0149dc2138a50dfcb3539ff313c208252994bf81cc5b6c4a0c3cb464db4ddd75

                                                                SHA512

                                                                517da272a8c08b30cd4dde577fcccf4a736aa7ff754be516246178f5b0adf2e1d9c1e86de7211419bd5ef7f2761ee61f856b6419160860e9a4ba0efda7ea0bce

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                Filesize

                                                                16B

                                                                MD5

                                                                6752a1d65b201c13b62ea44016eb221f

                                                                SHA1

                                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                SHA256

                                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                SHA512

                                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                8c5bdb92350aaf40f048ed74a5c5d952

                                                                SHA1

                                                                b0d01b2d9ad3a7b9b94e94569416219f0454622c

                                                                SHA256

                                                                130781eedcbf4fa5222ca1a2756754a5a120be163fd0a351f5a17367ead69e41

                                                                SHA512

                                                                565286130222ee2bdc9ab1726372ae71f3ac40c476916c9452eb54a9b671f6a4b10c8fe6f05b863090bae1219a04dced25ed2ef639f0d69458f16e99eaf9e659

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                f26edaec2424594f8ade5eaec3214f0a

                                                                SHA1

                                                                8f7b132064393ea58aefe680b53d201f800bfd00

                                                                SHA256

                                                                cfe96a0e1d985056eac0764acf1859439c310c520574ae321f01602bf7aafaff

                                                                SHA512

                                                                8752299553f8a65b9e66c15f54a09a0fb0ee216f9f932ca3ac5c8476d34d885b8093032ac949ee84a7f2cef0915505de811812cd7f3d52fd936609f4c22046dc

                                                              • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\logo.png

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                d6bd210f227442b3362493d046cea233

                                                                SHA1

                                                                ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                                                SHA256

                                                                335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                                                SHA512

                                                                464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                                              • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\wixstdba.dll

                                                                Filesize

                                                                118KB

                                                                MD5

                                                                4d20a950a3571d11236482754b4a8e76

                                                                SHA1

                                                                e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c

                                                                SHA256

                                                                a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b

                                                                SHA512

                                                                8b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2

                                                              • C:\Users\Admin\Downloads\Unconfirmed 424032.crdownload

                                                                Filesize

                                                                13.5MB

                                                                MD5

                                                                660708319a500f1865fa9d2fadfa712d

                                                                SHA1

                                                                b2ae3aef17095ab26410e0f1792a379a4a2966f8

                                                                SHA256

                                                                542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c

                                                                SHA512

                                                                18f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517

                                                              • C:\Users\Public\Desktop\ᏺ⍬ᯝᒌႃ܀⓴ߛ⫉ืڥ࣑║ᯃᥭሱףḎ⺓ಗ⒠᫵᷇൲⦑ົỨ⃤

                                                                Filesize

                                                                666B

                                                                MD5

                                                                e49f0a8effa6380b4518a8064f6d240b

                                                                SHA1

                                                                ba62ffe370e186b7f980922067ac68613521bd51

                                                                SHA256

                                                                8dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13

                                                                SHA512

                                                                de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4

                                                              • memory/768-432-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/768-433-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/768-618-0x0000000000400000-0x00000000005CC000-memory.dmp

                                                                Filesize

                                                                1.8MB