Analysis

  • max time kernel
    166s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2024 10:42

General

  • Target

    https://steam-gift-card50.com/50

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steam-gift-card50.com/50
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a3046f8,0x7ffe5a304708,0x7ffe5a304718
      2⤵
        PID:2892
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
        2⤵
          PID:3140
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5012
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
          2⤵
            PID:2368
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:1
            2⤵
              PID:2360
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:1
              2⤵
                PID:3804
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:8
                2⤵
                  PID:5152
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5168
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:1
                  2⤵
                    PID:5248
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:1
                    2⤵
                      PID:5256
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:1
                      2⤵
                        PID:5688
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:1
                        2⤵
                          PID:5696
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2346337106045938978,18133772381107702931,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3280 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:6460
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                        • Modifies Installed Components in the registry
                        • Enumerates connected drives
                        • Checks SCSI registry key(s)
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of SetWindowsHookEx
                        PID:2720
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5000.0.1030682129\303125204" -parentBuildID 20221007134813 -prefsHandle 1780 -prefMapHandle 1772 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {72734de5-e990-483d-afa8-53cfd08510fb} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" 1872 1f1ba1d8f58 gpu
                        1⤵
                          PID:1844
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5000.1.1830850427\1428318004" -parentBuildID 20221007134813 -prefsHandle 2288 -prefMapHandle 2284 -prefsLen 20785 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be0cbfe7-4041-4fc4-8944-1ae65dd89488} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" 2324 1f1b9efa258 socket
                          1⤵
                            PID:1356
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2280
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4112
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5000.2.851088025\1108635736" -childID 1 -isForBrowser -prefsHandle 3456 -prefMapHandle 3452 -prefsLen 20823 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d146e87d-1617-4b3e-bfe1-d5062b5e0043} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" 3468 1f1bdd4de58 tab
                                1⤵
                                  PID:3520
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5000.3.1433675592\849575668" -childID 2 -isForBrowser -prefsHandle 2884 -prefMapHandle 1516 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10b61f02-673a-48de-8d09-4878a1eb8b7f} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" 2828 1f1bfa79258 tab
                                  1⤵
                                    PID:4056
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3580
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5000.4.715692192\1603594357" -childID 3 -isForBrowser -prefsHandle 4480 -prefMapHandle 4476 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8421f16-08d0-43eb-b967-0963738155f7} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" 4484 1f1c0f0d458 tab
                                    1⤵
                                      PID:5480
                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                      • Modifies Internet Explorer settings
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:6040
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5000.5.1790603641\692184882" -childID 4 -isForBrowser -prefsHandle 4476 -prefMapHandle 2860 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fca7c1fd-9fe0-40b3-8021-f13b8848aef5} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" 2868 1f1bb68f758 tab
                                      1⤵
                                        PID:6048
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5000.6.1998495120\169730189" -childID 5 -isForBrowser -prefsHandle 4964 -prefMapHandle 4968 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9524d5c-9093-4a94-8d86-07fc0ddb95d7} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" 4956 1f1bd8daf58 tab
                                        1⤵
                                          PID:6056
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5000.7.1096952416\129737171" -childID 6 -isForBrowser -prefsHandle 5164 -prefMapHandle 5168 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1368 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {371a7d28-19dd-434f-9854-408984f76b53} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" 5156 1f1bd8d9d58 tab
                                          1⤵
                                            PID:6064
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                            • Modifies Internet Explorer settings
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:6456
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                            • Modifies Internet Explorer settings
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:6244
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                            • Modifies Internet Explorer settings
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5256
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                            • Modifies Internet Explorer settings
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5292
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                            • Modifies Internet Explorer settings
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4304
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                            • Modifies registry class
                                            PID:6748

                                          Network

                                          MITRE ATT&CK Matrix ATT&CK v13

                                          Persistence

                                          Boot or Logon Autostart Execution

                                          1
                                          T1547

                                          Registry Run Keys / Startup Folder

                                          1
                                          T1547.001

                                          Privilege Escalation

                                          Boot or Logon Autostart Execution

                                          1
                                          T1547

                                          Registry Run Keys / Startup Folder

                                          1
                                          T1547.001

                                          Defense Evasion

                                          Modify Registry

                                          2
                                          T1112

                                          Discovery

                                          Query Registry

                                          4
                                          T1012

                                          Peripheral Device Discovery

                                          2
                                          T1120

                                          System Information Discovery

                                          3
                                          T1082

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                            Filesize

                                            152B

                                            MD5

                                            36bb45cb1262fcfcab1e3e7960784eaa

                                            SHA1

                                            ab0e15841b027632c9e1b0a47d3dec42162fc637

                                            SHA256

                                            7c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae

                                            SHA512

                                            02c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                            Filesize

                                            152B

                                            MD5

                                            1e3dc6a82a2cb341f7c9feeaf53f466f

                                            SHA1

                                            915decb72e1f86e14114f14ac9bfd9ba198fdfce

                                            SHA256

                                            a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c

                                            SHA512

                                            0a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
                                            Filesize

                                            624B

                                            MD5

                                            5d3dc104c487c450e7f68d7732e1af32

                                            SHA1

                                            ff886c5db84548e9ed3dd60092ca8675fea9917a

                                            SHA256

                                            efc2970f596b13016d5baa6fa9285fa6c4f9120a63c0d6c305a4566f493db4c3

                                            SHA512

                                            fe6579088d77bc0ebbad4913bf9c7e0e3afffdfc96791f48bafba7ad254ff354fdbc09b71682762854e08bbc6f933485a9089a7cf3b876c7d4edd58060019154

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
                                            Filesize

                                            994B

                                            MD5

                                            22712126d1185b75d0daca389bd57c74

                                            SHA1

                                            c90b62b0fce47cec11c26027a6a807cff5239c21

                                            SHA256

                                            b4c06b4f49c4679102b916fec86404c18a7b2f42dac8fa685206193be04322ed

                                            SHA512

                                            84d93cb3cb6a34008e1fec3b9a553e27ff451b0f11c41ce2489030464c41365e35fccf89b86e425e298d8cec14e129a616d29ce61a552be54ff1f005d4f16787

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                            Filesize

                                            6KB

                                            MD5

                                            6885cf0a7971453ee8b034f1abf821d4

                                            SHA1

                                            2b93f8e234a7919b0103b8730a20510fe5ef2865

                                            SHA256

                                            3047aea4dd59711203e702b5f01e7c1d3d6572ce86bd448ff7207eaffec3ac15

                                            SHA512

                                            9a79f88eef4e3f231d471217a8ca88627deb2e2499df235a86e2ffdda25792bdbbd44f2c85e2ff7f28a021f88c8c59f17df798312d69d448c64c0fc4548dc055

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                            Filesize

                                            6KB

                                            MD5

                                            64701503b65cbe049186555e01e880ed

                                            SHA1

                                            d3ff612396ac54db98a7ea31ed3543af63940abf

                                            SHA256

                                            cfbdbfa6df4165853dda3c1c8305cf9338c21878386a5275298f72bff8aa3bf2

                                            SHA512

                                            7e44a71596112d4ec00eef4a8391b4abdbf29ba306f04998d391999562efb86215892acb28f07e92127e5c4d7e4184ff6f6c82fd4095faf8fc6f856818c61db6

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                            Filesize

                                            6KB

                                            MD5

                                            d1dd60f46e7f0d68578f4d1d8c4e0974

                                            SHA1

                                            3df22e18c5644dcbe4a8fa74c21bb547763fbda5

                                            SHA256

                                            3746683bbf0fbceb27027606641e0381139127c66bd5d8568df412537c6f0365

                                            SHA512

                                            b2cf043ad21b37dec73019f12052ac9e6fc75c399cf8bcf9139b924cbb2ef4783aff4f74feb083a5bd133b4408064a0ef8196c59b399a805c5d83c62b5d1b0c2

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                            Filesize

                                            6KB

                                            MD5

                                            bd3388367e50d586eed925e297c32871

                                            SHA1

                                            8f2fa0f7611d53d4329ec225348b40baf8af35e3

                                            SHA256

                                            42cdaa5e5038804b04cb36f438b5860fd76455192a9f32e2e7c5a4134d2eb457

                                            SHA512

                                            d12afa288f0884721dad3f895b3de66ac54457f75bbb1e93f544ba1188328f869aac9b252baf8c7c8bdb32768d9c17be8d7ee3688f939ee3fc9ca06262e138c8

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                            Filesize

                                            11KB

                                            MD5

                                            de493600a07f942041adf9663f045c4f

                                            SHA1

                                            e3b69143b11d71419237b8b79ecef44c852aef4c

                                            SHA256

                                            232efca61641caccb5401ff5f39f8c2eabf49e17e1257aa350c1a3ae173f096d

                                            SHA512

                                            64e9411d8e256de74fc1af4e22e43d18945fbd2a4bb9cfef3abfdfbb35ea9c6ac56d98bcead7d54bada0022cbebcff9e8bde124dea5213f545a11d8bc138ed4a

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                            Filesize

                                            11KB

                                            MD5

                                            2d7d5705120aef8b965c92a8a609f4ea

                                            SHA1

                                            b725756e2135f7b376104c8d09d7a39eb3652d6f

                                            SHA256

                                            5ab7a31bdc0956ef18d4d009c15232e536bee7c4737f1ea25fd92fc032cafa37

                                            SHA512

                                            e572aa91d00d2b5ef51a994c77471f562da431b1eb70c31f976e1674c356164cf6bb522cf849895c3ab0c0127cc2d0957cc2af66609fd1f1a5562b886afbe7be

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres
                                            Filesize

                                            2KB

                                            MD5

                                            c515c4b1e268977aad8c80bf6331a6a8

                                            SHA1

                                            09c527a609a7be0d1cc09f6d93cae20cd800e984

                                            SHA256

                                            8593ef7073990013fb9d464faa19022f286fac26b4c364a0f70387c7351280e1

                                            SHA512

                                            16bc7646ac81c79130418bebfe2a20cf41609c87c922998405685c4828661ef08a00a2e96fa1b8e166b1cae8995c5e55b32436837b4e18994bf5bf1710f2759f

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133554914162573252.txt
                                            Filesize

                                            74KB

                                            MD5

                                            80dffedad36ef4c303579f8c9be9dbd7

                                            SHA1

                                            792ca2a83d616ca82d973ece361ed9e95c95a0d8

                                            SHA256

                                            590ca4d2f62a7864a62ccb1075c55191f7f9d5c5304ea3446961bb50f9e3916e

                                            SHA512

                                            826b97a4de7c765f8f5ebc520960f68381fd9f4bfe68c2fbe46c6118110c9c14a87dcb8ed8102e60a954b4b3c408f72e7a93fd96317be3d51120a2ddd2faa3ea

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\Q5ROSPP2\microsoft.windows[1].xml
                                            Filesize

                                            97B

                                            MD5

                                            bdb8a591dda2dd9c96d20d4b44a5d041

                                            SHA1

                                            9e75f7deb9825c0cda7e25f66f0221f5c74c8d72

                                            SHA256

                                            7fcf82e6510873bad2d4687d21bc368fdc7e8576a8d54fc94284e1dbedda172f

                                            SHA512

                                            79166507556413e667d3bc7d5f24f1d87aed86d7b03e04b5591343cf307468b7b0446adfdf0452edbd657e97e840fa446314be0250d2b2966bff67d1261db439

                                          • \??\pipe\LOCAL\crashpad_1564_IABQLBHSDFEYPACQ
                                            MD5

                                            d41d8cd98f00b204e9800998ecf8427e

                                            SHA1

                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                            SHA256

                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                            SHA512

                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                          • memory/2720-73-0x0000000002860000-0x0000000002861000-memory.dmp
                                            Filesize

                                            4KB

                                          • memory/4304-303-0x000002CED40C0000-0x000002CED40E0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/4304-300-0x000002CED39B0000-0x000002CED39D0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/4304-298-0x000002CED3D00000-0x000002CED3D20000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/5256-252-0x00000256A2700000-0x00000256A2720000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/5256-250-0x00000256A2740000-0x00000256A2760000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/5256-254-0x00000256A2B00000-0x00000256A2B20000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/5292-271-0x0000020733C90000-0x0000020733CB0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/5292-273-0x0000020733C50000-0x0000020733C70000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/5292-275-0x0000020734060000-0x0000020734080000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/6040-85-0x000001E055FC0000-0x000001E055FE0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/6040-82-0x000001E055BB0000-0x000001E055BD0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/6040-79-0x000001E055BF0000-0x000001E055C10000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/6244-224-0x0000029C11CD0000-0x0000029C11CF0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/6244-229-0x000002A4130A0000-0x000002A4130C0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/6244-226-0x0000029C11C90000-0x0000029C11CB0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/6456-179-0x000001E2E12B0000-0x000001E2E12D0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/6456-181-0x000001E2E18C0000-0x000001E2E18E0000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/6456-176-0x000001E2E12F0000-0x000001E2E1310000-memory.dmp
                                            Filesize

                                            128KB