Analysis

  • max time kernel
    290s
  • max time network
    281s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2024 06:50

General

  • Target

    https://github.com/Pyran1/MalwareDatabase/blob/master/KeyLogger/CheetahKeyLogger/094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.zip

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.tshwanemuslimschool.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Mia@1805

Signatures

  • Cheetah Keylogger

    Cheetah is a keylogger and info stealer first seen in March 2020.

  • Cheetah Keylogger payload 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Pyran1/MalwareDatabase/blob/master/KeyLogger/CheetahKeyLogger/094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.zip
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85b2046f8,0x7ff85b204708,0x7ff85b204718
      2⤵
        PID:2692
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
        2⤵
          PID:3416
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2300
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:8
          2⤵
            PID:1868
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
            2⤵
              PID:2532
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
              2⤵
                PID:3684
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8
                2⤵
                  PID:1832
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:908
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:1
                  2⤵
                    PID:5252
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                    2⤵
                      PID:5260
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5252 /prefetch:8
                      2⤵
                        PID:5480
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:1
                        2⤵
                          PID:5488
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5504
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:1
                          2⤵
                            PID:5556
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:1
                            2⤵
                              PID:5564
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5840
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                              2⤵
                                PID:2824
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5132
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1
                                2⤵
                                  PID:5424
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1
                                  2⤵
                                    PID:3256
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                                    2⤵
                                      PID:5316
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6544 /prefetch:1
                                      2⤵
                                        PID:3756
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:1
                                        2⤵
                                          PID:224
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:1
                                          2⤵
                                            PID:2324
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,8171279046715996346,17107776867314048179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:1
                                            2⤵
                                              PID:404
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:3448
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:3224
                                              • C:\Windows\System32\rundll32.exe
                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                1⤵
                                                  PID:5936
                                                • C:\Program Files\7-Zip\7zG.exe
                                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\" -ad -an -ai#7zMap22113:190:7zEvent18817
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:5228
                                                • C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe
                                                  "C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4108
                                                  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Accesses Microsoft Outlook profiles
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • outlook_office_path
                                                    • outlook_win_path
                                                    PID:6056
                                                • C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe
                                                  "C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5448
                                                • C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe
                                                  "C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5936
                                                • C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe
                                                  "C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5196
                                                • C:\Program Files\7-Zip\7zG.exe
                                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\MEMZ-4.0\" -ad -an -ai#7zMap3203:78:7zEvent21411
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:5004
                                                • C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe
                                                  "C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe"
                                                  1⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2816
                                                  • C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe
                                                    "C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe" /watchdog
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1584
                                                  • C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe
                                                    "C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe" /watchdog
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3032
                                                  • C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe
                                                    "C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe" /watchdog
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:640
                                                  • C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe
                                                    "C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe" /watchdog
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4036
                                                  • C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe
                                                    "C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe" /watchdog
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3024
                                                  • C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe
                                                    "C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe" /main
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Writes to the Master Boot Record (MBR)
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5372
                                                    • C:\Windows\SysWOW64\notepad.exe
                                                      "C:\Windows\System32\notepad.exe" \note.txt
                                                      3⤵
                                                        PID:5744
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=best+way+to+kill+yourself
                                                        3⤵
                                                          PID:5388
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff85b2046f8,0x7ff85b204708,0x7ff85b204718
                                                            4⤵
                                                              PID:5376
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=stanky+danky+maymays
                                                            3⤵
                                                              PID:3596
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff85b2046f8,0x7ff85b204708,0x7ff85b204718
                                                                4⤵
                                                                  PID:1040
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=virus.exe
                                                                3⤵
                                                                  PID:4904
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff85b2046f8,0x7ff85b204708,0x7ff85b204718
                                                                    4⤵
                                                                      PID:4392
                                                              • C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe
                                                                "C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1440

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe.log

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                e57a6e70b8ae6940ed761121e5f86bad

                                                                SHA1

                                                                aa080336f2f6fd47ba55b7d9b5ff21ec27c665a2

                                                                SHA256

                                                                3f9e9790ecc228887f345c8cc495b550487c345c2ddb63aa8d81f45d02741f44

                                                                SHA512

                                                                16dc9d8b849f4a330e81fc8dfbfdc29823fb9fee7983bd9de7b936d14ccf94561b6697d67c237fc11d9720ad212b7c3b34b37921eb50fe315ee1b9678f058d9b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                7c6136bc98a5aedca2ea3004e9fbe67d

                                                                SHA1

                                                                74318d997f4c9c351eef86d040bc9b085ce1ad4f

                                                                SHA256

                                                                50c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2

                                                                SHA512

                                                                2d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                5c6aef82e50d05ffc0cf52a6c6d69c91

                                                                SHA1

                                                                c203efe5b45b0630fee7bd364fe7d63b769e2351

                                                                SHA256

                                                                d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32

                                                                SHA512

                                                                77ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000010

                                                                Filesize

                                                                197KB

                                                                MD5

                                                                5e28e72b443ded036a4cf369d0dda3bf

                                                                SHA1

                                                                0500de4480a54243b12d096745c6ba04c9479e66

                                                                SHA256

                                                                15fc7a054efbb9f76d937448fbb4814d7b3f25a6d137e24c1a69e32947eae71e

                                                                SHA512

                                                                7d17a5248e54e4dda8fd17a4d662edbb274629161a1e25b3b7f7f5112541663a5040788177268c53b2c78bc7e6d2204ccfb342d93c2ceec0a12d8a41788c088b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                794580a6a4bafd0de391d7820ad1f8f1

                                                                SHA1

                                                                31affabe4b85c292d40ed01f668e7233bc4d5d03

                                                                SHA256

                                                                6a96c6d957741e883b92cf9425aa62a8331986d29d42015f9f024cf4edbeeb98

                                                                SHA512

                                                                7be4b243ff1b3fb58ca95d0a37390dd50d153895a98c6f65bb04fa35604eac8d977e3631ad8ad987fd489aa3408c18c1a9c725defc907fd9d4723e55d3a29f78

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                6322cc1ae3184b737db535c362d7cce7

                                                                SHA1

                                                                8f4fd194cb90068a8c1245ee5cd947d1a3bcf0e7

                                                                SHA256

                                                                edf95d6a36d5b8b06ade3087f6f16bb040c74fd2b0aca25e4dbabd48a00c9dc7

                                                                SHA512

                                                                691c922d2d6976c9561ec5c16cd9dd4165dfa1a5a160a06a450fd02096911bfe2ea5e722401082794cdd92a38231c996fa17538259bc5e524fded5ed0f29aa67

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                6fa9a472db66734f623a4d8277081d59

                                                                SHA1

                                                                bd168e0ffdacec556bef8cac204b41592e0e5196

                                                                SHA256

                                                                597afaf8796904d8788fdc54aa2d558d332ea9e8f782cf90e768ad0bd3a4d377

                                                                SHA512

                                                                10c0e6bd78b351110d80286b7b27a87ec787261bda6569a5053d4f4cf3e748c37c552b40ef401cdc6aabaa26c108911fac7b3cbe987bbe8c33de3edf33e92a45

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                Filesize

                                                                579B

                                                                MD5

                                                                0a8a7c3dafeb4ad3d8cb846fc95b8f1c

                                                                SHA1

                                                                69e2b994e6882e1e783410dae53181984050fa13

                                                                SHA256

                                                                a88495f2c1c26c6c1d5690a29289467c8bb8a94bf6f4801d2c14da1456773f90

                                                                SHA512

                                                                2e59b4cd4cf6f86537aae4ae88e56e21abcff5070c5c1d1d2105a8e863523c80740438cc36b2b57672bc7bb7fb9387896135afcce534edfd4697fecf61031a5c

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                f19578b3489c7e32f77867e904f115f5

                                                                SHA1

                                                                757051033b7b95ce29ac845b4cb14a0c241e8487

                                                                SHA256

                                                                585faa88dbdf5cebe29b88eb9be96a9f782aec53c99223ca4e77671d9aabd9ec

                                                                SHA512

                                                                85cf7296cf9047f7188fead0d5077da5cedc6593ccb18479089030ba3616d7e426c69f7a53941d56cd1662cd5da064df34fa4a37528ffc6a1bcf00968c82e30f

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                7KB

                                                                MD5

                                                                502ff1f5a79b56c1efcf0c8586822091

                                                                SHA1

                                                                e2f5d4cd502b6908011649e52b08598244f4a283

                                                                SHA256

                                                                0c069b1d05b6fe0dfd248783f4416622a8efc926f5938b038905834afdc8b3d8

                                                                SHA512

                                                                f68867e69c4e3fc216b1e1f2a7feced86edbdf51deb90eb5ced7a6f9565062ef4d7ea487b99d6a35f47d1089cc4ee4f6b31ed3f6def19483991a02817036fa3f

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                7KB

                                                                MD5

                                                                cf556f15c7322cf519b65546648e528a

                                                                SHA1

                                                                795f8126b757e689ef5074e56cdc9daf7addaa38

                                                                SHA256

                                                                5f9970d3a2be22e7ea0d0ab4561257ef747c85c7a4dd43b15c4bb69332059902

                                                                SHA512

                                                                b8bb24fd19dfb15650285c7eb2030227630f761ebcb87344be77485489c818d223bb03935174f2461a213c43cfc202afebdf67cd56af349d8ba528157127dc11

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                cf905365eed6fc9f768dcc56aff589e7

                                                                SHA1

                                                                45be5839af9e760ec2bece2cd4d19421e9bb1f4a

                                                                SHA256

                                                                151b44b2c900b08445907e2d489dd463baeadf669031f49d7add2a79bec8e43f

                                                                SHA512

                                                                71bc7bef4b786dbf05be38aaf9e5279be8aa78e7a03a25f70047931593e2817106bf99052c8534d407b46ca55519309d37529e91ae3ec0216dfdf6a7456660db

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                7KB

                                                                MD5

                                                                75f989dfaf84bd185aa074066c52be16

                                                                SHA1

                                                                6e9fc13c8f7ecaf8c9c2722b2b8ca4bc5825ca8d

                                                                SHA256

                                                                7089312ab14b7bacb6af00965b816ba102fdbc557d92ada8243757df678ba13b

                                                                SHA512

                                                                cb95b5acc73708624ab5324883219837e95fff98556ceef18690b0ba4e343e015ed807ccb7286238fb3451bb9127edaff83c864c1da8b4d90621a4708a2e1aa5

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                5bfa60a4e3defb29a716f4029b3e1132

                                                                SHA1

                                                                8c208607fb5e76a0adab0ea6f40bf71a0a368ca4

                                                                SHA256

                                                                77b7242ad4a13de3020a8d08daaee2b3116f687739dfa87f8b0cb2f6af45d705

                                                                SHA512

                                                                2e99d1faa9b4e11e0d4d6209b8089b2f2f68cff332afd635e614bf5601d3ffedeb0c5cc21bda17f10042e6245a8522936f62364564518230dae708a98585e597

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                cd20957c2b88c7394af6109143bc6c6e

                                                                SHA1

                                                                1ca060dda5385772036bb7ecf437075e52fbd1b7

                                                                SHA256

                                                                de779e13bf18c412dea8cc491b2e6d1f234b87ac97d4bcb037084192aba585f2

                                                                SHA512

                                                                b62eda4ecaa6e9cc61bb83a334a40af31519303497ea010c12e0b88c021cc26d61de17e671da13aa5f05a4b13c703bf304b3a765400bfcfe4ed591e700d96f6e

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                bcf317ed50b09ff7733577aa97dcfda5

                                                                SHA1

                                                                94c9f8ae3cb3e5b55da7f1e5e18f3a32335e896c

                                                                SHA256

                                                                f96772f91865be8da4031da128ef46082e3c3e8ee57fa7a6d394e8b62e781586

                                                                SHA512

                                                                72b9a7322671db375020fca677b0096a6299049876774e9479ee2f6bfbeaa3f9039bfc608d67237daa508d06c24e98fa5455de252799eda1b9dd6344b4ac9198

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                c1b6f65fb31b7c60208f9fbbb5816b01

                                                                SHA1

                                                                3c526ea26e5714c084af63d045ccd3927cd899e5

                                                                SHA256

                                                                f7227c8e17ce09802b6dde50d05d5412c35e609c4edde026ca20d99c31be9eb0

                                                                SHA512

                                                                419a9ff8b07104525925d976caeabb20454edb27534b239663fd827581961c41aa68c3fe6f0033ac016ae7dde98674a2c1d7b87298295e410be6998f7f0f76a5

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                6326cb05f4bb5733981212866d4e0669

                                                                SHA1

                                                                20b04a8adb75f2e6d67ae8fd4bac1015c5401bdc

                                                                SHA256

                                                                2285749a3148a0d7dac091703615f4d52219adc970948625c5b02063d0064c97

                                                                SHA512

                                                                97f947743a5d5e013257acc72267ef6c0db56157a38fb45779ddcd9e758d36451e976ab40a3181bb92bf1ecbe52b01d52360ede3f943f01b648e4ff598943058

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                9634824e2b53d010a5e9cf12554399b3

                                                                SHA1

                                                                acef5279a25110e9dc610c583a30fb51633672af

                                                                SHA256

                                                                516420890796f82d4fd082079fd14e98ed74ea09546746c839f0c01b1b427068

                                                                SHA512

                                                                f445904ffaa815216c998e0393ed1bfe2d7995ccd6778f3f1e2e51f5c8f1477de10bddcf25ad6fc1e95750462ca231d9e02ebf99417edb5bbdb3dc3904d428ce

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                fb52c05343be54b291b1c41f3c4899d7

                                                                SHA1

                                                                63855bd18dad2f748d8895b79197af90791ccbe2

                                                                SHA256

                                                                0d8133dd89add7a767419e30217dbd26fc28ea54d884f74caa38a1e1fe5322e4

                                                                SHA512

                                                                f0a768e653fc053291758979fd34074a36eeb649a04dfb76f0c04b0ac591ee29c9f50a7198391ed2fa99451b58665de9669278b0821f9e7a8e3fca9e1b138209

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                7a9ca9d3f57b53ce092c103e8abac6b1

                                                                SHA1

                                                                1df1da6fbb2c6e608a1aaf80e53fc11ccff373c9

                                                                SHA256

                                                                5051eb19a5834ce95a80b4ba64503a1546a47b808182068d97d3b3a006ed3480

                                                                SHA512

                                                                f3dffa0a54f03cb7747c106e4f4568a15edbb517b384e33ea120c07ec2d80906ebf974008bd218aa79ddba572e7c0c877009de4e245199397b471e13ed5ef9a0

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                b7c3e763b1b01657b2780529d7eb8f01

                                                                SHA1

                                                                3c5d31a1f9b5d6630494a3c56fa7e16247f26525

                                                                SHA256

                                                                60f91f697fb026249580339504b992a9186022f3cd2889155bf3f95e11aaaa3e

                                                                SHA512

                                                                fd4d0c1a2894c81c63206ffe92489459c7ceef80f1d3289b62f26fd1854459928b04b2bf612d172cb18fcdbd3e392ee026c98c9621b3cc8cf4b18c4cec7945d2

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                2106abb955e9b3d36bd526a21b2e1521

                                                                SHA1

                                                                06ba737987ad9156d537a8b7fbc0d668c7e1a30c

                                                                SHA256

                                                                7851d47b371a5d15ab94b8ea21fcfb77e6740b6a51be98b653172aa033a3e5e2

                                                                SHA512

                                                                1435fdc1741d874c501c490188a6d74eb5b6cde35a5d546954187de24425247527e1fb6be880949d249f8f6153f382aaef59900afe9b26acdda377f4654e4b20

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5834c7.TMP

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                60c8ec2b78e75a8a5a142de1fa13109e

                                                                SHA1

                                                                db016d545a9454fb73a4133cc3cc2f44b5ab023a

                                                                SHA256

                                                                d6ce1686aa8314d569e6b9f9fe3444f4a54a2b17c8662eea78a9916166bf6f3b

                                                                SHA512

                                                                41eb70e6521a2c06d8df59fe3f2b376f17fd8bcb4b9e375971f7baa7919934345251022f80485305a5b4750f5f8b18b1632d6a3465f639b46b81eff71295dc62

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                Filesize

                                                                16B

                                                                MD5

                                                                6752a1d65b201c13b62ea44016eb221f

                                                                SHA1

                                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                SHA256

                                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                SHA512

                                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                12KB

                                                                MD5

                                                                c2118f8f3f593e0df833636bb7634939

                                                                SHA1

                                                                61fdc556d67fde573eb925d83fca7d4baac89e15

                                                                SHA256

                                                                43691ad9894199a7d6e2de5f294f1a4c42c9dc02b8e8d2ad1a9a772754c21f35

                                                                SHA512

                                                                3b57e98ed1a5f80c0a620e473fea009eb07495c02707d1668d7be3f7710ac0ace6ec1d058c23b6e79e9c6c3794dd5567bd0eb44258ba4ac5db66981c8bc15cde

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                12KB

                                                                MD5

                                                                e8bc641ee3883992bde8b3f33df1bb0b

                                                                SHA1

                                                                201d238a1267aa5862ba150c63a63e058f247838

                                                                SHA256

                                                                469a1ec220fd3e78175db64d502d3767cf13d7fcc634c5a81e911c44c33b40fe

                                                                SHA512

                                                                075930d7d4202e36b060963ba52f8e646ffa8b8d29ae0a87ce78e5946908ae7feb7f51936adb821388c9a8e1a2d141e06dba178e6f6b705c668e77e7d2459e43

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                12KB

                                                                MD5

                                                                70f183eae60fed289fdbd7c8cef094fc

                                                                SHA1

                                                                74c7bf04ad21b40e5145c91e519758fab90a9ece

                                                                SHA256

                                                                1b8f8e462b2f8e464eb6b2719f24c533aa9e8df22b7a602efe4f4d9c570c9b78

                                                                SHA512

                                                                37dec485a3e00bdd23b7f99efeb69db720a4bfa782b17cbe0b07038f0b2a1ed5451ff889446da276dae0b64fd8856afd8e5bc95c79f31037e6580cbb2bea60e1

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                12KB

                                                                MD5

                                                                afc28c6b01a6d16dd41055d1b512a94f

                                                                SHA1

                                                                1f5de41fbfe463d04e4c98a1ab4e152c9ff2c1c8

                                                                SHA256

                                                                d92707ba9e850f8e2b224315c67fe20ac9901bfbc696b71e855888013af5da4e

                                                                SHA512

                                                                f4b6e0794c00d3e00923d5bff48719328df59f6b7a87ad825045f3f49b4d978c53510348da427cb3bc1c8fda89e0d9de2b43a3d3f4d2d92e9f7e0844aa180733

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                12KB

                                                                MD5

                                                                dc197ab57899da4a77a2e551169fd317

                                                                SHA1

                                                                dae0cf895b78653f9055310edbfd972daa549935

                                                                SHA256

                                                                a515e15e3afa7c73c45ff3d6f79d7331ee66e57600002f44792ec622841f7122

                                                                SHA512

                                                                308e196973617b2c0d96d93d96b83671eed44ef05ddfe6b4d89e47ac3e56d84ad53428f1723402bc2814dffc1ec6c4df79f7db5de4f431e0e694b5d34a575f26

                                                              • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe

                                                                Filesize

                                                                41KB

                                                                MD5

                                                                5d4073b2eb6d217c19f2b22f21bf8d57

                                                                SHA1

                                                                f0209900fbf08d004b886a0b3ba33ea2b0bf9da8

                                                                SHA256

                                                                ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3

                                                                SHA512

                                                                9ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159

                                                              • C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.zip

                                                                Filesize

                                                                190KB

                                                                MD5

                                                                de3b772a12f282ffcf6699e936967f39

                                                                SHA1

                                                                be890d873392db3ce002559e7c6d3f8a407209c5

                                                                SHA256

                                                                46674805e2b7ca3aa146bc386827842d763d43e35a832518f1b1c422e1750fca

                                                                SHA512

                                                                34474d49d738232ba4aa165e7cb6a7aea4cd0d98a7c6213080f0c9f935c6c9f422b86f1aa6c4a5bc52942f673b86696f09fe47db992a3c7d47bf16c6f23bb65b

                                                              • C:\Users\Admin\Downloads\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a\094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a.exe

                                                                Filesize

                                                                333KB

                                                                MD5

                                                                ae7312cc7678c08eb133f384eb1a5a47

                                                                SHA1

                                                                2039eab4bf1c35d168472fc60cec42060ad2c36a

                                                                SHA256

                                                                094da8932234ce56d6869ed089cc8fa6ca6b15d1c4abdf481ccc5cf72ad1f41a

                                                                SHA512

                                                                7ed8d6d56da079b1af2d0d76d39e8b6ffce3115664b13e869f117c99346e2bd95cc450ab0c47a8575a4642bb5c254db9f33a37991ba005ea034e34b89f593424

                                                              • C:\Users\Admin\Downloads\MEMZ-4.0.zip

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                6d1c6d848c80c62c8886f3f4a05d9e16

                                                                SHA1

                                                                cd815164b65537f8134b389ea8698591b5f92043

                                                                SHA256

                                                                d6eb28f01b2d59777c30d37b851c095ce73c7fca0523805b7c1e6ad687d41d89

                                                                SHA512

                                                                39dcfd16526e4a9f395a151a277deccee62f46a4e0380adebaa3556e7e6b73ee6a197b32db1b70ec0c1dc6e766e82115e8bce088ce3ba48ca0e9d790b4b20eb2

                                                              • C:\Users\Admin\Downloads\MEMZ-4.0\MEMZ.exe

                                                                Filesize

                                                                14KB

                                                                MD5

                                                                19dbec50735b5f2a72d4199c4e184960

                                                                SHA1

                                                                6fed7732f7cb6f59743795b2ab154a3676f4c822

                                                                SHA256

                                                                a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

                                                                SHA512

                                                                aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

                                                              • C:\note.txt

                                                                Filesize

                                                                218B

                                                                MD5

                                                                afa6955439b8d516721231029fb9ca1b

                                                                SHA1

                                                                087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

                                                                SHA256

                                                                8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

                                                                SHA512

                                                                5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

                                                              • \??\pipe\LOCAL\crashpad_2844_DRAZTUPBXSIQPUCF

                                                                MD5

                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                SHA1

                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                SHA256

                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                SHA512

                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                              • memory/4108-276-0x00000000057F0000-0x0000000005800000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/4108-221-0x0000000005670000-0x0000000005702000-memory.dmp

                                                                Filesize

                                                                584KB

                                                              • memory/4108-208-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/4108-207-0x0000000000B10000-0x0000000000B6A000-memory.dmp

                                                                Filesize

                                                                360KB

                                                              • memory/4108-209-0x0000000002F40000-0x0000000002F54000-memory.dmp

                                                                Filesize

                                                                80KB

                                                              • memory/4108-219-0x0000000005B40000-0x00000000060E4000-memory.dmp

                                                                Filesize

                                                                5.6MB

                                                              • memory/4108-220-0x0000000002F70000-0x0000000002F78000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/4108-273-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/4108-231-0x00000000057F0000-0x0000000005800000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/4108-232-0x0000000005790000-0x0000000005798000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/4108-233-0x0000000005AA0000-0x0000000005AE4000-memory.dmp

                                                                Filesize

                                                                272KB

                                                              • memory/4108-234-0x00000000057D0000-0x00000000057D8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/4108-275-0x00000000057F0000-0x0000000005800000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/4108-236-0x00000000057F0000-0x0000000005800000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/4108-248-0x00000000067C0000-0x00000000067E2000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/4108-280-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/5196-274-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/5448-238-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/5448-282-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/5936-297-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/5936-246-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/6056-327-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB

                                                              • memory/6056-299-0x0000000006290000-0x000000000629A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/6056-277-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                Filesize

                                                                144KB

                                                              • memory/6056-287-0x0000000005E40000-0x0000000005EA6000-memory.dmp

                                                                Filesize

                                                                408KB

                                                              • memory/6056-286-0x0000000005970000-0x0000000005B32000-memory.dmp

                                                                Filesize

                                                                1.8MB

                                                              • memory/6056-285-0x0000000004E80000-0x0000000004F1C000-memory.dmp

                                                                Filesize

                                                                624KB

                                                              • memory/6056-283-0x00000000047E0000-0x00000000047F0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/6056-284-0x0000000004750000-0x0000000004786000-memory.dmp

                                                                Filesize

                                                                216KB

                                                              • memory/6056-328-0x00000000047E0000-0x00000000047F0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/6056-281-0x0000000074CD0000-0x0000000075480000-memory.dmp

                                                                Filesize

                                                                7.7MB